Cargando…

A Tale of Three Signatures: Practical Attack of ECDSA with wNAF

Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hi...

Descripción completa

Detalles Bibliográficos
Autores principales: De Micheli, Gabrielle, Piau, Rémi, Pierrot, Cécile
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334987/
http://dx.doi.org/10.1007/978-3-030-51938-4_18