Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.
Dahmun GoudarziMatthieu RivainDamien VergnaudPublished in: SAC (2016)
Keyphrases
- scalar multiplication
- elliptic curve
- digital signature
- power analysis
- key management
- countermeasures
- security protocols
- elliptic curve cryptography
- secure communication
- diffie hellman
- efficient computation
- watermarking scheme
- digital images
- watermarking algorithm
- security mechanisms
- end to end
- computational efficiency