Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
DOI10.1007/978-3-030-89915-8_11zbMATH Open1491.94050OpenAlexW3209902965MaRDI QIDQ2145305FDOQ2145305
Authors: Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluđerović
Publication date: 17 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-89915-8_11
Recommendations
side-channel analysiscorrelation power analysisisogeny-based cryptographySIKEpost-quantum key exchangesingle-trace attack
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Secure integration of asymmetric and symmetric encryption schemes
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Constructing elliptic curve isogenies in quantum subexponential time
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Horizontal Correlation Analysis on Exponentiation
- Assessing the feasibility of single trace power analysis of Frodo
- On the Security of Supersingular Isogeny Cryptosystems
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Title not available (Why is that?)
- Online template attacks
- Faster isogeny-based compressed key agreement
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
- Arithmetic Considerations for Isogeny-Based Cryptography
- Single-trace side-channel attacks on masked lattice-based encryption
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- The argument against quantum computers
- Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder
Cited In (6)
- SIKE round 2 speed record on ARM Cortex-M4
- On the feasibility of single-trace attacks on the Gaussian sampler using a CDT
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Safe-error attacks on SIKE and CSIDH
- Attacking embedded ECC implementations through CMOV side channels
- BIKE key-recovery: combining power consumption analysis and information-set decoding
Uses Software
This page was built for publication: Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2145305)