Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure against the Timing Attack
- 1 January 2000
- book chapter
- Published by Springer Nature
- p. 178-190
- https://doi.org/10.1007/3-540-44495-5_16
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Bitslice Ciphers and Power Analysis AttacksPublished by Springer Nature ,2001
- Use of Elliptic Curves in CryptographyPublished by Springer Nature ,2000
- Fast Implementation of Elliptic Curve Arithmetic in GF(p n )Published by Springer Nature ,2000
- Elliptic Curves with the Montgomery-Form and Their Cryptographic ApplicationsPublished by Springer Nature ,2000
- Towards Sound Approaches to Counteract Power-Analysis AttacksPublished by Springer Nature ,1999
- Differential Power AnalysisPublished by Springer Nature ,1999
- On the Importance of Checking Cryptographic Protocols for FaultsPublished by Springer Nature ,1997
- Elliptic Curve CryptosystemsMathematics of Computation, 1987
- Speeding the Pollard and Elliptic Curve Methods of FactorizationMathematics of Computation, 1987
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978