Sciweavers

46 search results - page 5 / 10
» Elliptic Curve Cryptosystems and Side-channel Attacks
Sort
View
ASPDAC
2010
ACM
121views Hardware» more  ASPDAC 2010»
13 years 5 months ago
Scan-based attack against elliptic curve cryptosystems
Ryuta Nara, Nozomu Togawa, Masao Yanagisawa, Tatsu...
DCC
2005
IEEE
14 years 7 months ago
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Elliptic curve cryptosystems in the presence of faults were studied by Biehl, Meyer and M?uller (2000). The first fault model they consider requires that the input point P in the c...
Mathieu Ciet, Marc Joye
25
Voted
ISAAC
2004
Springer
142views Algorithms» more  ISAAC 2004»
14 years 26 days ago
On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem
It has been suggested that a major obstacle in finding an index calculus attack on the elliptic curve discrete logarithm problem lies in the difficulty of lifting points from elli...
Qi Cheng, Ming-Deh A. Huang
LATINCRYPT
2010
13 years 5 months ago
Combined Implementation Attack Resistant Exponentiation
Different types of implementation attacks, like those based on side channel leakage and active fault injection, are often considered as separate threats. Countermeasures are, there...
Jörn-Marc Schmidt, Michael Tunstall, Roberto ...
CHES
2004
Springer
182views Cryptology» more  CHES 2004»
14 years 27 days ago
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
In the current work we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed b...
Pradeep Kumar Mishra