scientific article; zbMATH DE number 1882022
From MaRDI portal
Publication:4797390
zbMath1007.68994MaRDI QIDQ4797390
Publication date: 20 March 2003
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99)
Related Items (17)
A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation ⋮ Key Bit-Dependent Attack on Protected PKC Using a Single Trace ⋮ Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS ⋮ Horizontal collision correlation attack on elliptic curves ⋮ New fault attacks using Jacobi symbol and application to regular right-to-left algorithms ⋮ T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks ⋮ A new key recovery side-channel attack on HQC with chosen ciphertext ⋮ A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace ⋮ On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance ⋮ Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms ⋮ Improving the Big Mac Attack on Elliptic Curve Cryptography ⋮ Exponent Recoding and Regular Exponentiation Algorithms ⋮ Distinguishing Multiplications from Squaring Operations ⋮ RSA key recovery from digit equivalence information
This page was built for publication: