2017 IEEE East-West Design &Amp; Test Symposium (EWDTS) 2017
DOI: 10.1109/ewdts.2017.8110037
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…In [15]- [16] it was evaluated only for a field multiplier. As reported in [5] this randomization increases the resistance of ECC designs against horizontal attacks but is not sufficient as a single countermeasure. In consequence we combined this approach with applying of the classical multiplication formula for the calculation of partial products.…”
Section: Contribution Of This Papermentioning
confidence: 94%
See 3 more Smart Citations
“…In [15]- [16] it was evaluated only for a field multiplier. As reported in [5] this randomization increases the resistance of ECC designs against horizontal attacks but is not sufficient as a single countermeasure. In consequence we combined this approach with applying of the classical multiplication formula for the calculation of partial products.…”
Section: Contribution Of This Papermentioning
confidence: 94%
“…In this paper we report on the impact of using a classical multiplication formula on the success of the low-cost horizontal DPA attack, that is described in [5]- [8]. Additionally we randomized the sequence of calculation of partial products by each field multiplication as described in [5]. The idea to randomize the sequence was proposed in [15]- [16].…”
Section: Contribution Of This Papermentioning
confidence: 99%
See 2 more Smart Citations
“…Even if each key bit is processed using exactly the same operation sequence, the data dependability can result in a successfully revealed key if horizontal DPA attacks are applied [10]. Blinding of the elliptic curve (EC) point P or randomization of the projective coordinates of point P once at the beginning of the kP calculation do not provide protection against horizontal DPA attacks [11]. The randomization of the private key k does not hinder horizontal DPA attacks because the revealed randomized key can successfully be used instead of the real private key.…”
Section: Introductionmentioning
confidence: 99%