Implementation Attacks on Exponentiation Algorithms
Star 0
Share
Abstract
Implementations of the Discrete Logarithm Based Cryptography are vulnerable on many side-channel and fault attacks. In this session, two new approaches for such attacks are presented. Topic 1:…