Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
暂无分享,去创建一个
Kun Jiang | Jing Liu | Lihui Wang | Bing Zhao | Weijun Shan
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[3] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[4] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[5] Zhenbin Zhang,et al. A Novel Template Attack on wNAF Algorithm of ECC , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[6] Nigel P. Smart,et al. Preventing SPA/DPA in ECC Systems Using the Jacobi Form , 2001, CHES.