On the worst-case side-channel security of ECC point randomization in embedded devices
From MaRDI portal
Publication:2152029
DOI10.1007/978-3-030-65277-7_9zbMath1492.94060OpenAlexW3107238311MaRDI QIDQ2152029
Kostas Papagiannopoulos, Romain Poussier, Vincent Verneuil, Melissa Azouaoui, François Durvaux, François-Xavier Standaert
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_9
elliptic curve cryptographyside-channel analysisbelief propagationpoint randomizationsingle-trace attacks
Cryptography (94A60) Elliptic curves (14H52) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Masking proofs are tight and how to exploit it in security evaluations
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- Soft Analytical Side-Channel Attacks
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
- Horizontal Collision Correlation Attack on Elliptic Curves
- Horizontal Correlation Analysis on Exponentiation
- Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors
- Modular Multiplication Without Trial Division
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
- Security Evaluations beyond Computing Power
- NaCl on 8-Bit AVR Microcontrollers
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
This page was built for publication: On the worst-case side-channel security of ECC point randomization in embedded devices