Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
27
views
22
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,248
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings
Lattice-Based Weak Curve Fault Attack on ECDSA
other
Author(s):
Weiqiong Cao
,
Hongsong Shi
,
Hua Chen
,
Wei Wei
,
Jiazhe Chen
Publication date
(Online):
June 15 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
22
Record
: found
Abstract
: not found
Article
: not found
Factoring polynomials with rational coefficients
A. Lenstra
,
H. W. Lenstra
,
L. Lov�sz
(1982)
0
comments
Cited
59
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Complexity of Lattice Problems
Daniele Micciancio
,
Shafi Goldwasser
(2002)
0
comments
Cited
57
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Parallel Collision Search with Cryptanalytic Applications
Michael J. Wiener
,
Paul C. van Oorschot
(1999)
0
comments
Cited
51
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
June 15 2021
Pages
: 146-161
DOI:
10.1007/978-3-030-78120-0_10
SO-VID:
bbf5f040-ce78-4db8-9019-3398c9a6cc43
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany
pp. 19
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
pp. 36
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials
pp. 53
A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited
pp. 66
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection
pp. 83
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware
pp. 103
ESQABE: Predicting Encrypted Search Queries
pp. 118
Reconnection-Based Covert Channels in Wireless Networks
pp. 134
Minecraft Altered Skin Channel (MASC)
pp. 146
Lattice-Based Weak Curve Fault Attack on ECDSA
pp. 165
HyperSec: Visual Analytics for Blockchain Security Monitoring
pp. 181
100 Popular Open-Source Infosec Tools
pp. 196
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators
pp. 213
Accept All: The Landscape of Cookie Banners in Greece and the UK
pp. 228
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?
pp. 242
Compiling Personal Data and Subject Categories from App Data Models
pp. 256
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App
pp. 270
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens
pp. 287
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security
pp. 302
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption
pp. 317
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
pp. 332
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
pp. 351
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning
pp. 367
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles
pp. 382
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns
pp. 401
What Is Lurking in Your Backups?
pp. 416
How Do Users Chain Email Accounts Together?
pp. 430
Tensions that Hinder the Implementation of Digital Security Governance
Similar content
2,248
Channel-Aware ECDSA Signature Verification of Basic Safety Messages with K-Means Clustering in VANETs
Authors:
Elyes Ben Hamida
,
Muhammad Awais Javed
Fast Secure Two-Party ECDSA Signing
Authors:
Yehuda Lindell
,
Domenico Giulini
InternetX.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA
Authors:
Q. Dang
,
S. Santesson
,
K. Moriarty
…
See all similar