Sciweavers

46 search results - page 4 / 10
» Elliptic Curve Cryptosystems and Side-channel Attacks
Sort
View
PKC
2004
Springer
151views Cryptology» more  PKC 2004»
14 years 25 days ago
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
Toru Akishita, Tsuyoshi Takagi
DCC
2001
IEEE
14 years 7 months ago
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Recently, and contrary to the common belief, Rivest and Silverman argued that the use of strong primes is unnecessary in the RSA cryptosystem. This paper analyzes how valid this as...
Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takag...
IJNSEC
2011
106views more  IJNSEC 2011»
13 years 2 months ago
Elliptic Curve Cryptosystems and Side-channel Attacks
In this paper, we present a background on elliptic curve cryptosystems (ECCs) along with the different methods used to compute the scalar multiplication (ECSM), which is the core...
Ekambaram Kesavulu Reddy
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Differential Fault Attacks on Elliptic Curve Cryptosystems
Ingrid Biehl, Bernd Meyer, Volker Müller
IEICET
2006
73views more  IEICET 2006»
13 years 7 months ago
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro...