Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
From MaRDI portal
Publication:2145305
Recommendations
Cites work
- scientific article; zbMATH DE number 1504818 (Why is no real title available?)
- scientific article; zbMATH DE number 1878343 (Why is no real title available?)
- A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
- Arithmetic Considerations for Isogeny-Based Cryptography
- Assessing the feasibility of single trace power analysis of Frodo
- Constructing elliptic curve isogenies in quantum subexponential time
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder
- Faster isogeny-based compressed key agreement
- Horizontal Correlation Analysis on Exponentiation
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- On the Security of Supersingular Isogeny Cryptosystems
- Online template attacks
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Secure integration of asymmetric and symmetric encryption schemes
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Single-trace side-channel attacks on masked lattice-based encryption
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- The argument against quantum computers
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cited in
(6)- Attacking embedded ECC implementations through CMOV side channels
- SIKE round 2 speed record on ARM Cortex-M4
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Safe-error attacks on SIKE and CSIDH
- On the feasibility of single-trace attacks on the Gaussian sampler using a CDT
- BIKE key-recovery: combining power consumption analysis and information-set decoding
This page was built for publication: Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2145305)