Horizontal collision correlation attack on elliptic curves
From MaRDI portal
Publication:892284
DOI10.1007/S12095-014-0111-8zbMATH Open1365.94400OpenAlexW2111978877MaRDI QIDQ892284FDOQ892284
Emmanuel Prouff, Aurélie Bauer, Jean-René Reinhard, Eliane Jaulmes, Justine Wild
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0111-8
Recommendations
- Horizontal collision correlation attack on elliptic curves
- Side-channel analysis of Montgomery's representation randomization
- A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
- Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
Cites Work
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Title not available (Why is that?)
- Statistical Analysis of Second Order Differential Power Analysis
- Modular Multiplication Without Trial Division
- Title not available (Why is that?)
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Elliptic Curve Cryptosystems
- Faster Addition and Doubling on Elliptic Curves
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- A normal form for elliptic curves
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Title not available (Why is that?)
- Theory of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Mutual information analysis: a comprehensive study
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Highly Regular Right-to-Left Algorithms for Scalar Multiplication
- Title not available (Why is that?)
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- A SIGNED BINARY MULTIPLICATION TECHNIQUE
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- Title not available (Why is that?)
- Title not available (Why is that?)
- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
- ROSETTA for Single Trace Analysis
- Horizontal Correlation Analysis on Exponentiation
- Title not available (Why is that?)
- Statistical Tools Flavor Side-Channel Collision Attacks
- Horizontal Collision Correlation Attack on Elliptic Curves
- Correlation-Enhanced Power Analysis Collision Attack
- Coordinate Blinding over Large Prime Fields
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- Fast Software Encryption
Cited In (7)
- Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder
- Digital signature with elliptic curves over the finite fields
- Collision Attacks on Variant of OCB Mode and Its Series
- Collision attack on \({\mathtt Grindahl}\)
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding
- Speeding up regular elliptic curve scalar multiplication without precomputation
- Attacking embedded ECC implementations through CMOV side channels
Uses Software
This page was built for publication: Horizontal collision correlation attack on elliptic curves
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892284)