From 501d17b11a86d6a3780435db5416830c9d6175e2 Mon Sep 17 00:00:00 2001 From: J08nY Date: Tue, 29 Aug 2023 16:15:00 +0200 Subject: Add ZVP point computation. --- docs/references.rst | 5 +++++ 1 file changed, 5 insertions(+) (limited to 'docs/references.rst') diff --git a/docs/references.rst b/docs/references.rst index 63aaf41..d215948 100644 --- a/docs/references.rst +++ b/docs/references.rst @@ -8,3 +8,8 @@ References .. [HEHCC] Handbook of Elliptic and Hyper-Elliptic Curve Cryptography, https://www.hyperelliptic.org/HEHCC/ .. [HAC] Handbook of Applied Cryptography, https://cacr.uwaterloo.ca/hac/ .. [BBG+17] Sliding right into disaster: Left-to-right sliding windows leak, https://eprint.iacr.org/2017/627.pdf +.. [RPA] A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, http://www.goubin.fr/papers/ecc-dpa.pdf +.. [ZVP] Zero-value point attacks on elliptic curve cryptosystem, https://doi.org/10.1007/10958513_17 +.. [EPA] Exceptional procedure attack on elliptic curve cryptosystems, https://doi.org/10.1007/3-540-36288-6_17 +.. [FFD] A formula for disaster: a unified approach to elliptic curve special-point-based attacks, https://eprint.iacr.org/2021/1595.pdf +.. [MT1991] Mazur, B., & Tate, J. (1991). The `p`-adic sigma function. Duke Mathematical Journal, 62 (3), 663-688. -- cgit v1.2.3-70-g09d2