Invalid-curve attacks on (hyper)elliptic curve cryptosystems
From MaRDI portal
Publication:540375
DOI10.3934/AMC.2010.4.307zbMATH Open1213.94116OpenAlexW2079198712MaRDI QIDQ540375FDOQ540375
Authors: Koray Karabina, Berkant Ustaoglu
Publication date: 3 June 2011
Published in: Advances in Mathematics of Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3934/amc.2010.4.307
Recommendations
Cited In (7)
- Validation of Elliptic Curve Public Keys
- Invalid curve attacks in a GLS setting
- Protecting ECC against fault attacks: the ring extension method revisited
- On Edwards curves and ZVP-attacks
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
- Points on curves in small boxes and applications
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
This page was built for publication: Invalid-curve attacks on (hyper)elliptic curve cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q540375)