@ARTICLE{Wrońska_Michał_Combined_2019,
author={Wrońska, Michał},
volume={vol. 65},
number={No 2},
pages={203–209},
howpublished={online},
year={2019},
publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications},
abstract={Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography. Most of these models allow to use fast and complete arithmetic which is especially convenient in fast implementations that are side-channel attacks resistant. Montgomery, Edwards and twisted Edwards curves have always order of group of rational points divisible by 4. Huff’s curves have always order of rational points divisible by 8. Moreover, sometimes to get fast and efficient implementations one can choose elliptic curve with even bigger cofactor, for example 16. Of course the bigger cofactor is, the smaller is the security of cryptosystem which uses such elliptic curve. In this article will be checked what influence on the security has form of cofactor of elliptic curve and will be showed that in some situations elliptic curves with cofactor divisible by 2m are vulnerable for combined small subgroups and side-channel attacks.},
type={Artykuły / Articles},
title={Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m},
URL={http://www.czasopisma.pan.pl/Content/110215/PDF/28.pdf},
doi={10.24425/ijet.2019.126302},
keywords={Small subgroups attack, side-channel attack, alternative models of elliptic curves},
}