搜索结果: 1-2 共查到“protected implementations”相关记录2条 . 查询时间(0.045 秒)
The efficient protection of security critical devices against side-channel analysis attacks is a fundamental need in the age of Internet of Things and ubiquitous computing. In this work, we introduce ...
Safe-Errors on SPA Protected implementations with the Atomicity Technique
Elliptic Curve Cryptography Side-Channel Atomicity Fault Attacks
2015/12/24
ECDSA is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Cryptography (ECC) agains...