The following pages link to (Q4502796):
Displaying 50 items.
- Scalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithm (Q396590) (← links)
- First-order side channel attacks on Zhang's countermeasures (Q433061) (← links)
- A novel elliptic curve scalar multiplication algorithm against power analysis (Q474700) (← links)
- Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis (Q497571) (← links)
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding (Q778376) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- A metric on the set of elliptic curves over \(\mathbb{F}_p\) (Q847404) (← links)
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis (Q881859) (← links)
- The distributions of individual bits in the output of multiplicative operations (Q892279) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Constructive and destructive use of compilers in elliptic curve cryptography (Q1015356) (← links)
- Attacking embedded ECC implementations through CMOV side channels (Q1698620) (← links)
- Lattice attacks against elliptic-curve signatures with blinded scalar multiplication (Q1698621) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- White-box ECDSA: challenges and existing solutions (Q2145299) (← links)
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 (Q2145305) (← links)
- Resistance of isogeny-based cryptographic implementations to a fault attack (Q2145308) (← links)
- On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029) (← links)
- Efficient hardware implementations for elliptic curve cryptography over Curve448 (Q2152030) (← links)
- Recovering secrets from prefix-dependent leakage (Q2191199) (← links)
- Speeding up regular elliptic curve scalar multiplication without precomputation (Q2210646) (← links)
- Improving the arithmetic of elliptic curves in the Jacobi model (Q2380005) (← links)
- Cryptography on twisted Edwards curves over local fields (Q2515455) (← links)
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace (Q2790057) (← links)
- Improving the Big Mac Attack on Elliptic Curve Cryptography (Q2803645) (← links)
- Safe-Errors on SPA Protected Implementations with the Atomicity Technique (Q2803660) (← links)
- Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs (Q2817816) (← links)
- Practical Realisation and Elimination of an ECC-Related Software Bug Attack (Q2890003) (← links)
- Localized Electromagnetic Analysis of Cryptographic Implementations (Q2890009) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security (Q3011304) (← links)
- Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation (Q3011912) (← links)
- Defeating RSA Multiply-Always and Message Blinding Countermeasures (Q3073697) (← links)
- Square Always Exponentiation (Q3104721) (← links)
- Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS (Q3194592) (← links)
- Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks (Q3297502) (← links)
- SCATTER: A New Dimension in Side-Channel (Q3297554) (← links)
- An efficient method against side-channel attacks on ECC (Q3443224) (← links)
- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations (Q3452232) (← links)
- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring (Q3452234) (← links)
- A Leakage Resilient MAC (Q3460113) (← links)
- On Avoiding ZVP-Attacks Using Isogeny Volcanoes (Q3605396) (← links)
- Elliptic curve scalar multiplication with x-coordinate (Q3610404) (← links)
- Fault Analysis Attack against an AES Prototype Chip Using RSL (Q3623065) (← links)
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation (Q3623066) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- Random Order m-ary Exponentiation (Q3634511) (← links)
- Exponent Recoding and Regular Exponentiation Algorithms (Q3637149) (← links)
- Distinguishing Multiplications from Squaring Operations (Q3644212) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting (Q4605650) (← links)