Cargando…
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hi...
Autores principales: | De Micheli, Gabrielle, Piau, Rémi, Pierrot, Cécile |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334987/ http://dx.doi.org/10.1007/978-3-030-51938-4_18 |
Ejemplares similares
-
Online Template Attack on ECDSA:: Extracting Keys via the Other Side
por: Roelofs, Niels, et al.
Publicado: (2020) -
S-PRG-based toothpastes compared to NaF toothpaste and NaF varnish on dentin permeability
in vitro
por: MOSQUIM, Victor, et al.
Publicado: (2022) -
NaF-PET Imaging of Atherosclerosis Burden
por: Høilund-Carlsen, Poul F., et al.
Publicado: (2023) -
NafA Negatively Controls Neisseria meningitidis Piliation
por: Kuwae, Asaomi, et al.
Publicado: (2011) -
Interactions between mitoNEET and NAF-1 in cells
por: Karmi, Ola, et al.
Publicado: (2017)