When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015
- 28 October 2016
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side ChannelsPublished by Association for Computing Machinery (ACM) ,2016
- Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android SmartphonesPublished by Springer Science and Business Media LLC ,2016
- Elliptic Curves for Security2016
- Remote Timing Attacks Are Still PracticalLecture Notes in Computer Science, 2011
- Curve25519: New Diffie-Hellman Speed RecordsLecture Notes in Computer Science, 2006
- Remote timing attacks are practicalComputer Networks, 2005
- Template AttacksLecture Notes in Computer Science, 2003
- Lattice Attacks on Digital Signature SchemesDesigns, Codes and Cryptography, 2001
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996