Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
- 11 September 2001
- book chapter
- Published by Springer Nature
- p. 324-334
- https://doi.org/10.1007/3-540-45439-x_22
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Software Implementation of the NIST Elliptic Curves Over Prime FieldsPublished by Springer Nature ,2001
- Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure against the Timing AttackPublished by Springer Nature ,2000
- Elliptic Curves with the Montgomery-Form and Their Cryptographic ApplicationsPublished by Springer Nature ,2000
- Differential Power AnalysisPublished by Springer Nature ,1999
- Elliptic Curves in CryptographyPublished by Cambridge University Press (CUP) ,1999
- Resistance Against Differential Power Analysis For Elliptic Curve CryptosystemsPublished by Springer Nature ,1999
- Efficient Elliptic Curve Exponentiation Using Mixed CoordinatesPublished by Springer Nature ,1998
- Efficient elliptic curve exponentiationPublished by Springer Nature ,1997
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsPublished by Springer Nature ,1996
- Speeding the Pollard and Elliptic Curve Methods of FactorizationMathematics of Computation, 1987