The Doubling Attack – Why Upwards Is Better than Downwards
- 1 January 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Developments in Language TheoryPublished by Springer Nature ,2003
- Randomized Signed-Scalar Multiplication of ECC to Resist Power AttacksPublished by Springer Nature ,2003
- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel AttacksPublished by Springer Nature ,2002
- A Refined Power-Analysis Attack on Elliptic Curve CryptosystemsPublished by Springer Nature ,2002
- Differential Power AnalysisPublished by Springer Nature ,1999
- Resistance Against Differential Power Analysis For Elliptic Curve CryptosystemsPublished by Springer Nature ,1999
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsPublished by Springer Nature ,1996
- Optimal asymmetric encryptionPublished by Springer Nature ,1995
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Blind Signatures for Untraceable PaymentsPublished by Springer Nature ,1983