Cryptology ePrint Archive: Report 2012/485
Available versions in chronological order
20120822:232816 (posted 22-Aug-2012 23:28:16 UTC)
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms
Neil Hanley and HeeSeok Kim and Michael Tunstall
20121001:105044 (posted 01-Oct-2012 10:50:44 UTC)
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms
Neil Hanley and HeeSeok Kim and Michael Tunstall
20130814:163359 (posted 14-Aug-2013 16:33:59 UTC)
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley and HeeSeok Kim and Michael Tunstall
20130916:162335 (posted 16-Sep-2013 16:23:35 UTC)
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley and HeeSeok Kim and Michael Tunstall
20131219:014706 (posted 19-Dec-2013 01:47:06 UTC)
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley and HeeSeok Kim and Michael Tunstall
20131219:014811 (posted 19-Dec-2013 01:48:11 UTC)
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley and HeeSeok Kim and Michael Tunstall
[
Cryptology ePrint archive
]