Affiliation:
1. OneSpan, Brussels, Belgium
Abstract
AbstractDue to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks. Over the past few years, several techniques for secure implementations have been published. This paper revisits the ring extension method and its adaptation to the elliptic curve setting.
Subject
Applied Mathematics,Computational Mathematics,Computer Science Applications
Reference126 articles.
1. Diophantine problems in geometry and elliptic ternary forms;Duke Math. J.,1948
2. On a new generalization of Huff curves;Cryptology ePrint Archive,2011
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2022
2. White-Box ECDSA: Challenges and Existing Solutions;Constructive Side-Channel Analysis and Secure Design;2021