Attacking embedded ECC implementations through CMOV side channels
From MaRDI portal
Publication:1698620
DOI10.1007/978-3-319-69453-5_6zbMath1412.94194OpenAlexW2573935459MaRDI QIDQ1698620
Łukasz Chmielewski, David Oswald, Peter Schwabe, Erick Nascimento
Publication date: 16 February 2018
Full work available at URL: http://pure-oai.bham.ac.uk/ws/files/29531942/SAC_2016_paper.pdf
Related Items
Key Bit-Dependent Attack on Protected PKC Using a Single Trace, Protecting the most significant bits in scalar multiplication algorithms, Differential fault attack on Montgomery ladder and in the presence of scalar randomization, Attacking embedded ECC implementations through CMOV side channels, Speeding up regular elliptic curve scalar multiplication without precomputation, High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Horizontal collision correlation attack on elliptic curves
- Attacking embedded ECC implementations through CMOV side channels
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace
- Attacking Randomized Exponentiations Using Unsupervised Learning
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
- Correlation Analysis against Protected SFM Implementations of RSA
- 8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors
- ROSETTA for Single Trace Analysis
- Localized Electromagnetic Analysis of Cryptographic Implementations
- Memory Address Side-Channel Analysis on Exponentiation
- Online Template Attacks
- Horizontal Correlation Analysis on Exponentiation
- Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Attacking Exponent Blinding in RSA without CRT
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- NaCl on 8-Bit AVR Microcontrollers
- The Doubling Attack – Why Upwards Is Better than Downwards
- A Practical Countermeasure against Address-Bit Differential Power Analysis
- “Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way
- Comparative Power Analysis of Modular Exponentiation Algorithms
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Solving Discrete Logarithms from Partial Knowledge of the Key