2012
DOI: 10.1007/978-3-642-27954-6_15
|View full text |Cite
|
Sign up to set email alerts
|

Localized Electromagnetic Analysis of Cryptographic Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
47
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(48 citation statements)
references
References 18 publications
1
47
0
Order By: Relevance
“…When different registers are used depending on the processed sensitive values, "the assignment of concerned registers to physical locations should be repeatedly randomized [...] during execution" [93]. This is similar to the proposed parallelization countermeasure.…”
Section: Effective Countermeasuresmentioning
confidence: 97%
See 2 more Smart Citations
“…When different registers are used depending on the processed sensitive values, "the assignment of concerned registers to physical locations should be repeatedly randomized [...] during execution" [93]. This is similar to the proposed parallelization countermeasure.…”
Section: Effective Countermeasuresmentioning
confidence: 97%
“…In 2012, location-dependent electromagnetic leakage was successfully exploited in an attack on an elliptic curve scalar multiplication implementation on a Field Programmable Gate Array (FPGA) using a near-field EM probe [93]. The authors scanned the die surface and collected EM traces at every point.…”
Section: Electromagnetic Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Another template attack on ECC is presented in [21]. This attack exploits register location-based leakage using a high-resolution inductive EM probe; therefore, the attack is considerably expensive to execute.…”
Section: Introductionmentioning
confidence: 99%
“…A clustering attack was shown to break an ECC hardware implementation without any profiling or leakage models by Heyszl et al [31]; Sprecht et al [49] later improved this attack. In addition to these, also local electromagnetic measurements have been shown to offer means to launch successful single-trace attacks, e.g., by Heyszl et al [32].…”
Section: Introductionmentioning
confidence: 99%