Invalid-curve attacks on (hyper)elliptic curve cryptosystems
From MaRDI portal
Publication:540375
DOI10.3934/AMC.2010.4.307zbMATH Open1213.94116OpenAlexW2079198712MaRDI QIDQ540375FDOQ540375
Authors: Koray Karabina, Berkant Ustaoglu
Publication date: 3 June 2011
Published in: Advances in Mathematics of Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3934/amc.2010.4.307
Recommendations
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
- scientific article; zbMATH DE number 2154287
- scientific article; zbMATH DE number 1186877
- Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models
- Invalid curve attacks in a GLS setting
Cited In (8)
- Validation of Elliptic Curve Public Keys
- Invalid curve attacks in a GLS setting
- Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models
- Protecting ECC against fault attacks: the ring extension method revisited
- On Edwards curves and ZVP-attacks
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
- Points on curves in small boxes and applications
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
This page was built for publication: Invalid-curve attacks on (hyper)elliptic curve cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q540375)