This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fast scalar multiplication on elliptic curves, we extend the scope of Montgomery ladder to any exponentiation in an abelian group. Computationally, the Montgomery ladder has the triple advantage of presenting a Lucas chain structure, of being parallelized, and of sharing a common operand. Furthermore, contrary to the classical binary algorithms, it behaves very regularly, which makes it naturally protected against a large variety of implementation attacks
Recently, many physical attack types (e.g., timing attacks, power consumption attacks, fault attacks...
The iterative conditional branchings appear in various sensitive algorithms, like the modular expone...
Hyperelliptic curves of low genus obtained a lot of attention in the recent past for cryptographic a...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
In this paper, we combine the RNS representation and the Montgomery ladder on elliptic curves in Wei...
International audienceIn this paper, we present a new fault attack on elliptic curve scalar product ...
International audienceUsing powerful tools on genus 2 curves like the Kummer variety, we generalize ...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Abstract. In this paper, we present novel randomized techniques to enhance Montgomery powering ladde...
Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Di...
In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This attac...
Meloni recently introduced a new type of arithmetic on elliptic curves when adding projective points...
Part 2: Security EngineeringInternational audienceIn 2010, Joye et. al brought the so-called Huff cu...
Recently, many physical attack types (e.g., timing attacks, power consumption attacks, fault attacks...
The iterative conditional branchings appear in various sensitive algorithms, like the modular expone...
Hyperelliptic curves of low genus obtained a lot of attention in the recent past for cryptographic a...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
In this paper, we combine the RNS representation and the Montgomery ladder on elliptic curves in Wei...
International audienceIn this paper, we present a new fault attack on elliptic curve scalar product ...
International audienceUsing powerful tools on genus 2 curves like the Kummer variety, we generalize ...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Abstract. In this paper, we present novel randomized techniques to enhance Montgomery powering ladde...
Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Di...
In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This attac...
Meloni recently introduced a new type of arithmetic on elliptic curves when adding projective points...
Part 2: Security EngineeringInternational audienceIn 2010, Joye et. al brought the so-called Huff cu...
Recently, many physical attack types (e.g., timing attacks, power consumption attacks, fault attacks...
The iterative conditional branchings appear in various sensitive algorithms, like the modular expone...
Hyperelliptic curves of low genus obtained a lot of attention in the recent past for cryptographic a...