Key Bit-Dependent Attack on Protected PKC Using a Single Trace
From MaRDI portal
Publication:5056016
DOI10.1007/978-3-319-72359-4_10zbMath1506.94068OpenAlexW2775625212MaRDI QIDQ5056016
Publication date: 9 December 2022
Published in: Information Security Practice and Experience (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-72359-4_10
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacking embedded ECC implementations through CMOV side channels
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace
- Attacking Randomized Exponentiations Using Unsupervised Learning
- Localized Electromagnetic Analysis of Cryptographic Implementations
- Horizontal Correlation Analysis on Exponentiation
- Information and Communications Security
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Highly Regular Right-to-Left Algorithms for Scalar Multiplication
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- A Practical Countermeasure against Address-Bit Differential Power Analysis
- Comparative Power Analysis of Modular Exponentiation Algorithms
This page was built for publication: Key Bit-Dependent Attack on Protected PKC Using a Single Trace