Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revisionBoth sides next revision
public:research:main [2024-01-18 15:50] – [Security of cryptographic hardware (smartcards, TPMs...)] xjancarpublic:research:main [2024-01-18 15:50] – [Cryptanalysis of elliptic curves and other algebraic methods] xjancar
Line 181: Line 181:
 In the past, we were systematically analyzing standardized elliptic curves. Lately, we have been mainly focusing on ECC with respect to side-channel attacks and the involvement of elliptic curves in the Bitcoin protocol. In the past, we were systematically analyzing standardized elliptic curves. Lately, we have been mainly focusing on ECC with respect to side-channel attacks and the involvement of elliptic curves in the Bitcoin protocol.
  
-<button collapse="ecc">Find out more</button>+<button icon="fa fa-caret-down" collapse="ecc">Find out more</button>
 <button  icon="fa fa-file-text-o">[[:publications:keywords:ecc|Publications]]</button> <button  icon="fa fa-file-text-o">[[:publications:keywords:ecc|Publications]]</button>