2013
DOI: 10.1007/s13389-013-0062-6
|View full text |Cite
|
Sign up to set email alerts
|

A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(24 citation statements)
references
References 52 publications
0
23
0
1
Order By: Relevance
“…Regarding side-channel analysis, the scalar multiplication has received a lot of attention since the inception of this field [FV12,Dan+13], but recently vulnerabilities on other operations have emerged, like for example the nonce inversion operation [ACSS17,PGB17] and the multiplication of rd mod p [Rya19].…”
Section: Security Of An Unexpected Gcd Call In Mbedtls Ecdsamentioning
confidence: 99%
“…Regarding side-channel analysis, the scalar multiplication has received a lot of attention since the inception of this field [FV12,Dan+13], but recently vulnerabilities on other operations have emerged, like for example the nonce inversion operation [ACSS17,PGB17] and the multiplication of rd mod p [Rya19].…”
Section: Security Of An Unexpected Gcd Call In Mbedtls Ecdsamentioning
confidence: 99%
“…Scalar multiplication has received generous attention w.r.t. SCA since the attack vector's inception, and several good surveys exist on the topic [Fan+10,FV12,Dan+13]. But vulnerabilities on other operations have emerged recently, such as in the nonce inversion operation [ACSS17,PGB17], and the modular reduction after h + rα [Rya19].…”
Section: Projective Coordinates Attack and Ecdsa: Previous Workmentioning
confidence: 99%
“…ECDSA uses the secret nonce to compute a scalar multiplication, a highly targeted operation in the SCA realm [BH09,Fan+10,FV12,Dan+13,AVL19]. The modular inversion of the nonce is also a target [AGS07,PGB17,Ald+19a], as well as ECDSA private key operations [Rya19].…”
Section: Introductionmentioning
confidence: 99%
“…For attacking symmetric block ciphers, the most popular technique is Differential Fault Analysis (DFA), in which the fault is usually inserted in the last rounds of a cipher for observing differences between correct and faulty ciphertexts. Other techniques include Collision Fault Analysis (CFA), Ineffective Fault Analysis (IFA), Safe-Error Analysis (SEA) [7,8]. We have chosen DFA as our attack technique, with inserting multiple faults in the penultimate round of PRESENT cipher.…”
Section: Introductionmentioning
confidence: 99%