Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2011, Article ID 580749, 11 pages
http://dx.doi.org/10.1155/2011/580749
Research Article

Analysis of the Fault Attack ECDLP over Prime Field

School of Mathematics, Shandong University, Jinan 250100, China

Received 17 May 2011; Revised 27 August 2011; Accepted 12 September 2011

Academic Editor: Tak-Wah Lam

Copyright © 2011 Mingqiang Wang and Tao Zhan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [9 citations]

The following is the list of published articles that have cited the current article.

  • Jinna Li, Yuan Li, Haibin Yu, Yanhong Xie, and Cheng Zhang, “Adaptive Fault Detection for Complex Dynamic Processes Based on JIT Updated Data Set,” Journal of Applied Mathematics, vol. 2012, pp. 1–17, 2012. View at Publisher · View at Google Scholar
  • MingQiang Wang, HaiYang Xue, and Tao Zhan, “Fault attacks on hyperelliptic curve discrete logarithm problem over binary field,” Science China Information Sciences, vol. 57, no. 3, pp. 1–17, 2014. View at Publisher · View at Google Scholar
  • Taechan Kim, and Mehdi Tibouchi, “Bit-flip faults on elliptic curve base fields, revisited,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8479, pp. 163–180, 2014. View at Publisher · View at Google Scholar
  • Taechan Kim, and Mehdi Tibouchi, “Bit-flip faults on elliptic curve base fields, revisited,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8479, pp. 163–180, 2014. View at Publisher · View at Google Scholar
  • Pedro L. Moro, Michael M. McNeil, Lakshmi Sukumaran, and Karen R. Broder, “The Centers for Disease Control and Prevention's public health response to monitoring Tdap safety in pregnant women in the United States,” Human Vaccines & Immunotherapeutics, vol. 11, no. 12, pp. 2872–2879, 2015. View at Publisher · View at Google Scholar
  • Konrad Kubasiewicz, Marcin Runowski, Stefan Lis, and Agata Szczeszak, “Synthesis, structural and spectroscopic studies on GdBO3:Yb3+/Tb3+@SiO2 core-shell nanostructures,” Journal Of Rare Earths, vol. 33, no. 11, pp. 1148–1154, 2015. View at Publisher · View at Google Scholar
  • Zhibo Yang, Aiju Liu, and Ruiyun Yang, “Analysis of Laser-Brazed Diamond Particle Microstructures,” Materials Science-Medziagotyra, vol. 21, no. 4, pp. 616–621, 2015. View at Publisher · View at Google Scholar
  • Taechan Kim, Mehdi Tibouchi, Taechan Kim, and Mehdi Tibouchi, “Invalid Curve Attacks in a GLS Setting,” Advances In Information And Computer Security (Iwsec 2015), vol. 9241, pp. 41–55, 2015. View at Publisher · View at Google Scholar
  • Mehdi Rahmani-andebili, “Simultaneous placement of DG and capacitor in distribution network,” Electric Power Systems Research, vol. 131, pp. 1–10, 2016. View at Publisher · View at Google Scholar