Attacking embedded ECC implementations through CMOV side channels
From MaRDI portal
Publication:1698620
DOI10.1007/978-3-319-69453-5_6zbMATH Open1412.94194OpenAlexW2573935459MaRDI QIDQ1698620FDOQ1698620
Authors: Erick Nascimento, Łukasz Chmielewski, David Oswald, Peter Schwabe
Publication date: 16 February 2018
Full work available at URL: http://pure-oai.bham.ac.uk/ws/files/29531942/SAC_2016_paper.pdf
Recommendations
- On the worst-case side-channel security of ECC point randomization in embedded devices
- An efficient method against side-channel attacks on ECC
- A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
- Side-channel analysis of embedded systems. An efficient algorithmic approach
- Galois LFSR, Embedded Devices and Side Channel Weaknesses
- Evaluating the cache side channel attacks against ECDSA
- Practical realisation and elimination of an ECC-related software bug attack
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- scientific article; zbMATH DE number 1088918
Cites Work
- Chipwhisperer: an open-source platform for hardware embedded security research
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- The doubling attack -- why upwards is better than downwards.
- Title not available (Why is that?)
- Title not available (Why is that?)
- ROSETTA for single trace analysis
- Horizontal Correlation Analysis on Exponentiation
- A practical countermeasure against address-bit differential power analysis.
- Horizontal collision correlation attack on elliptic curves
- 8/16/32 shades of elliptic curve cryptography on embedded processors
- Nacl on 8-bit AVR microcontrollers
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Title not available (Why is that?)
- Online template attacks
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- Attacking embedded ECC implementations through CMOV side channels
- Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
- Attacking randomized exponentiations using unsupervised learning
- Correlation analysis against protected SFM implementations of RSA
- Localized electromagnetic analysis of cryptographic implementations
- Memory address side-channel analysis on exponentiation
- Trade-off approaches for leak resistant modular arithmetic in RNS
- Attacking Exponent Blinding in RSA without CRT
- ``Ooh aah\(\ldots \)Just a little bit : a small amount of side channel can go a long way
- Comparative Power Analysis of Modular Exponentiation Algorithms
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Solving Discrete Logarithms from Partial Knowledge of the Key
Cited In (11)
- High-performance implementation of elliptic curve cryptography using vector instructions
- Protecting the most significant bits in scalar multiplication algorithms
- Cryptographic Side-Channels from Low-Power Cache Memory
- Title not available (Why is that?)
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
- Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks
- Speeding up regular elliptic curve scalar multiplication without precomputation
- Attacking embedded ECC implementations through CMOV side channels
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace
- Differential fault attack on Montgomery ladder and in the presence of scalar randomization
- Title not available (Why is that?)
Uses Software
This page was built for publication: Attacking embedded ECC implementations through CMOV side channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1698620)