diff options
| author | J08nY | 2024-01-18 18:13:31 +0100 |
|---|---|---|
| committer | J08nY | 2024-01-18 18:13:31 +0100 |
| commit | 4f06ca481cef138a76142dbc075d05923fe55221 (patch) | |
| tree | 55d058375a6116482a4f9f2608fc9f6f3abc3d44 | |
| parent | 55078874b2000d85d5b7966fd9a403a8fa47a185 (diff) | |
| download | pyecsca-notebook-4f06ca481cef138a76142dbc075d05923fe55221.tar.gz pyecsca-notebook-4f06ca481cef138a76142dbc075d05923fe55221.tar.zst pyecsca-notebook-4f06ca481cef138a76142dbc075d05923fe55221.zip | |
Add ZVP to README.
| -rw-r--r-- | README.md | 5 |
1 files changed, 5 insertions, 0 deletions
@@ -54,6 +54,11 @@ the scalar multiplier of ECC implementations, given access to a power side-chann The [EPA](re/epa.ipynb) notebook uses the ideas behind the Exceptional Procedure Attack to reverse-engineer the coordinate system and formulas of ECC implementations, given access to an error side-channel. +#### ZVP-RE + +The [ZVP](re/zvp.ipynb) notebook uses the Zero-Value Point attack-based technique to reverse-engineer +the coordinate system and formulas of ECC implementations, given access to a power side-channel. + #### Structural The [structural](re/structural.ipynb) notebook explores the structure of scalar multiplers and addition |
