Sciweavers

13 search results - page 3 / 3
» ches 2001
Sort
View
CHES
2001
Springer
130views Cryptology» more  CHES 2001»
14 years 3 days ago
Generating Elliptic Curves of Prime Order
A variation of the Complex Multiplication (CM) method for generating elliptic curves of known order over finite fields is proposed. We give heuristics and timing statistics in th...
Erkay Savas, Thomas A. Schmidt, Çetin Kaya ...
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
14 years 25 days ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
AAECC
2003
Springer
116views Algorithms» more  AAECC 2003»
14 years 25 days ago
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
Abstract. A way for preventing SPA-like attacks on elliptic curve systems is to use the same formula for the doubling and the general addition of points on the curve. Various propo...
Olivier Billet, Marc Joye