Low-cost fault detection method for ECC using Montgomery powering ladder
暂无分享,去创建一个
Ingrid Verbauwhede | Jörn-Marc Schmidt | Junfeng Fan | Dusko Karaklajic | I. Verbauwhede | Junfeng Fan | Dusko Karaklajic | Jörn-Marc Schmidt
[1] Marc Joye,et al. Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis , 2000, IEEE Trans. Computers.
[2] Jacques Stern,et al. Projective Coordinates Leak , 2004, EUROCRYPT.
[3] Agustin Dominguez-Oviedo,et al. On Fault-based Attacks and Countermeasures for Elliptic Curve Cryptosystems , 2008 .
[4] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[5] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[6] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[7] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[8] Patrick Schaumont,et al. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[9] Marc Joye,et al. The Montgomery Powering Ladder , 2002, CHES.
[10] Ian F. Blake,et al. Advances in Elliptic Curve Cryptography: Frontmatter , 2005 .
[11] Denis Réal,et al. Fault Attack on Elliptic Curve Montgomery Ladder Implementation , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[12] Bernd Meyer,et al. Differential Fault Attacks on Elliptic Curve Cryptosystems , 2000, CRYPTO.
[13] Norbert Felber,et al. ECC Is Ready for RFID - A Proof in Silicon , 2008, Selected Areas in Cryptography.
[14] Marc Joye,et al. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults , 2005, Des. Codes Cryptogr..
[15] Ricardo Dahab,et al. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation , 1999, CHES.
[16] Nevine Maurice Ebeid,et al. Securing the Elliptic Curve Montgomery Ladder against Fault Attacks , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[17] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .