Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

horizontal SCA attacks

biblio

Visible to the public Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves

Submitted by aekwall on Mon, 02/15/2021 - 4:56pm
  • Elliptic curve cryptography (ECC)
  • Weierstrass elliptic curves
  • side channel analysis (SCA) attacks
  • random order execution
  • point doubling operations
  • point addition
  • open-source designs
  • Montgomery ladder
  • horizontal SCA attacks
  • horizontal DPA attacks
  • hardware accelerators
  • fully balanced ASIC coprocessor
  • complete addition formulas
  • Scalability
  • application specific integrated circuits
  • coprocessors
  • Clocks
  • logic design
  • Registers
  • Elliptic curves
  • Elliptic curve cryptography
  • public key cryptography
  • Metrics
  • pubcrawl
  • Resiliency

Terms of Use  |  ©2023. CPS-VO