Applied Cryptography and Network Security
DOI10.1007/B98360zbMATH Open1103.68516OpenAlexW4301861138MaRDI QIDQ4680959FDOQ4680959
Authors: Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Y.-S. Hwang, Young-Ho Park, Souhwan Jung
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
DPASPASide Channel AttacksAgagliate's CountermeasureBSD RepresentationEbeid-Hasan's CountermeasureElliptic Curve CryptosystemHa-Moon's Countermeasure
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (10)
- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- First-order side channel attacks on Zhang's countermeasures
- Information Security Practice and Experience
- Breaking randomized mixed-radix scalar multiplication algorithms
- Selected Areas in Cryptography
- T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace
- Progress in Cryptology - INDOCRYPT 2003
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680959)