Using Bleichenbacher” s solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA

E De Mulder, M Hutter, ME Marson… - … Hardware and Embedded …, 2013 - Springer
In this paper we describe an attack against nonce leaks in 384-bit ECDSA using an FFT-
based attack due to Bleichenbacher. The signatures were computed by a modern smart …

High-Performance ECC Scalar Multiplication Architecture Based on Comb Method and Low-Latency Window Recoding Algorithm

J Zhang, Z Chen, M Ma, R Jiang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Elliptic curve scalar multiplication (ECSM) is the essential operation in elliptic curve
cryptography (ECC) for achieving high performance and security. We introduce a novel high …

Exponent recoding and regular exponentiation algorithms

M Joye, M Tunstall - Progress in Cryptology–AFRICACRYPT 2009: Second …, 2009 - Springer
This paper describes methods of recoding exponents to allow for regular implementations of
m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literature …

When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA

AC Aldaya, BB Brumley - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Microarchitecture based side-channel attacks are common threats nowadays. Intel SGX
technology provides a strong isolation from an adversarial OS, however, does not guarantee …

Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version

E De Mulder, M Hutter, ME Marson… - Journal of Cryptographic …, 2014 - Springer
In this paper, we describe an attack against nonce leaks in 384-bit ECDSA using an FFT-
based attack due to Bleichenbacher. The signatures were computed by a modern smart …

QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing

S Ullah, MT Hussain, M Yousaf - Multimedia Tools and Applications, 2022 - Springer
In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the
sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve …

Automatic topic discovery of online hospital reviews using an improved LDA with Variational Gibbs Sampling

R de Groof, H Xu - 2017 IEEE International Conference on Big …, 2017 - ieeexplore.ieee.org
E-commerce websites such as Yelp. com, allow users to write online reviews of products
and services, so new customers can have quick access to user experiences, covering …

A secure and efficient implementation of the quotient digital signature algorithm (qdsa)

A Faz-Hernández, H Fujii, DF Aranha… - Security, Privacy, and …, 2017 - Springer
Digital signatures provide a means to publicly authenticate messages sent over an insecure
channel. Recently, the Quotient Digital Signature Algorithm (qDSA) was introduced aiming …

[PDF][PDF] Review of side channel attacks and countermeasures on ecc, rsa, and aes cryptosystems

A Lo'ai, HH Tawalbeh, F Turki - Journal of Internet …, 2017 - infonomics-society.org
There are many recent revolutionary technologies and advances in wireless communication
and networking that changed people lives all over the globe. The wide spread of Internet …

A Searchable Encryption Scheme Based on Elliptic Curves

SL Nita, MI Mihailescu - … and Network Applications: Proceedings of the …, 2020 - Springer
As in the present we live in the era of the digitalized data, we need to protect our data
against malicious users. Cloud computing represents a key technology nowadays, due to its …