Publication:4536798

From MaRDI portal


zbMath0989.94505MaRDI QIDQ4536798

Bernd Meyer, Ingrid Biehl, Volker Müller

Publication date: 6 August 2002



94A60: Cryptography

14G50: Applications to coding theory and cryptography of arithmetic geometry


Related Items

Unnamed Item, A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA), A Brief History of Pairings, All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks, Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, Differential fault attack on Montgomery ladder and in the presence of scalar randomization, Analysis of the fault attack ECDLP over prime field, Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography, Fault-based attack on Montgomery's ladder algorithm, Differential fault analysis of AES: toward reducing number of faults, Fault attacks on hyperelliptic curve discrete logarithm problem over binary field, Quantum lattice enumeration and tweaking discrete pruning, Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures, Towards practical key exchange from ordinary isogeny graphs, Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje, Fault analysis of the NTRUSign digital signature scheme, White-box cryptography: don't forget about grey-box attacks, Protecting ECC against fault attacks: the ring extension method revisited, White-box ECDSA: challenges and existing solutions, Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA, Elliptic curve cryptosystems in the presence of permanent and transient faults, Efficient Algorithms for Supersingular Isogeny Diffie-Hellman, Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes, Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round, General Fault Attacks on Multivariate Public Key Cryptosystems, Lattice-Based Fault Attacks Against ECMQV, Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm, Fault Attacks on Public Key Elements: Application to DLP-Based Schemes, Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k )