You are looking at a specific version 20190521:082904 of this paper. See the latest version.

Paper 2019/495

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

Marc Joye

Abstract

Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks. Over the past few years, several techniques for secure implementations have been published. This paper revisits the ring extension method and its adaptation to the elliptic curve setting.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. NutMiC 2019
Keywords
Elliptic curvesformal groupsdegenerate curveselliptic curve cryptosystemsfault attackscountermeasures
Contact author(s)
marc joye @ onespan com
History
2019-05-21: revised
2019-05-20: received
See all versions
Short URL
https://ia.cr/2019/495
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.