2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018
DOI: 10.1109/ntms.2018.8328695
|View full text |Cite
|
Sign up to set email alerts
|

Horizontal Address-Bit DEMA against ECDSA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

4
3

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…We are aware of some issues of the Montgomery ladder. It is vulnerable to the horizontal Address Bit attack which was presented in [3,16]. The main leakage source is the key dependent addressing of the registers in the algorithm.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We are aware of some issues of the Montgomery ladder. It is vulnerable to the horizontal Address Bit attack which was presented in [3,16]. The main leakage source is the key dependent addressing of the registers in the algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…The scalar k is a random number. This random number has to be kept secret [2], since otherwise the private key of the user applied for the signature generation can be easily calculated [3]. In ECDH-based protocols for one-side authentication, as for example in [4], the scalar k is the private key in the kP operation performed and has to be kept secret.…”
Section: Introductionmentioning
confidence: 99%
“…Practical examples of horizontal attacks against asymmetric cryptographic approaches such RSA or ECC are the SPA described in [7], simple electromagnetic analysis (SEMA) attacks e.g. [8], the Big Mac attack [9], the localized EMA attack [10], horizontal collision correlation analysis (HCCA) attacks [11]- [12] , horizontal DPA and DEMA attacks [13], [14]. Vertical attacks corresponding to the new classification are "more than one trace" attacks i.e.…”
Section: Background: Verical and Horizontal Attacksmentioning
confidence: 99%
“…Corresponding to the ECDSA signature generation protocol the scalar k is a random number. This number that has to be kept secret, since otherwise the private key can be easily calculated [2]. In the EC authentication protocol the scalar k is the private key and has to be kept secret.…”
Section: A Implementation Detailsmentioning
confidence: 99%