aboutsummaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
authorJ08nY2024-01-18 18:13:31 +0100
committerJ08nY2024-01-18 18:13:31 +0100
commit4f06ca481cef138a76142dbc075d05923fe55221 (patch)
tree55d058375a6116482a4f9f2608fc9f6f3abc3d44
parent55078874b2000d85d5b7966fd9a403a8fa47a185 (diff)
downloadpyecsca-notebook-4f06ca481cef138a76142dbc075d05923fe55221.tar.gz
pyecsca-notebook-4f06ca481cef138a76142dbc075d05923fe55221.tar.zst
pyecsca-notebook-4f06ca481cef138a76142dbc075d05923fe55221.zip
Add ZVP to README.
-rw-r--r--README.md5
1 files changed, 5 insertions, 0 deletions
diff --git a/README.md b/README.md
index 837c831..58c959f 100644
--- a/README.md
+++ b/README.md
@@ -54,6 +54,11 @@ the scalar multiplier of ECC implementations, given access to a power side-chann
The [EPA](re/epa.ipynb) notebook uses the ideas behind the Exceptional Procedure Attack to reverse-engineer
the coordinate system and formulas of ECC implementations, given access to an error side-channel.
+#### ZVP-RE
+
+The [ZVP](re/zvp.ipynb) notebook uses the Zero-Value Point attack-based technique to reverse-engineer
+the coordinate system and formulas of ECC implementations, given access to a power side-channel.
+
#### Structural
The [structural](re/structural.ipynb) notebook explores the structure of scalar multiplers and addition