A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures
2022
Proceedings of the Great Lakes Symposium on VLSI 2022
We propose an unsupervised differentialbit horizontal clustering attack and implement it against an ECDH FPGA implementation. ...
Over the past decade, a few side-channel attacks (SCAs) and countermeasures against implementations of Elliptic-Curve Cryptography (ECC), commonly used in embedded systems and Internet-of-Things (IoT) ...
Horizontal Clustering Attack Framework Recent years have seen unsupervised clustering techniques being applied to side-channel power analysis [4, 16, 17] . ...
doi:10.1145/3526241.3530342
fatcat:wbjmcjxhjvbtzn5qnvtjjdihli
Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version)
[article]
2017
IACR Cryptology ePrint Archive
In practice horizontal attacks have been applied to overcome protected ECC implementations on FPGAs. ...
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. ...
Running on embedded systems, they are a common target of side-channel attacks. ...
dblp:journals/iacr/NascimentoC17
fatcat:3x3mjse46vcbfgplz5tpdnilka
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
2020
Transactions on Cryptographic Hardware and Embedded Systems
Nevertheless, horizontal attacks based on a single trace still pose serious threats to protected ECC or RSA implementations. ...
To mitigate side-channel attacks, real-world implementations of public-key cryptosystems adopt state-of-the-art countermeasures based on randomization of the private or ephemeral keys. ...
We thank anonymous reviewers and the shepherd for the suggestions on how to improve the paper. ...
doi:10.46586/tches.v2021.i1.343-372
fatcat:dvaxbi67ener7doaop53ixkgle
Attacking Embedded ECC Implementations Through cmov Side Channels
[chapter]
2017
Lecture Notes in Computer Science
Side-channel attacks against implementations of elliptic-curve cryptography have been extensively studied in the literature and a large tool-set of countermeasures is available to thwart different attacks ...
However, this attack is applied to an implementation that is not protected with either, ...
Horizontal attacks on RSA [57, 18, 17, 8, 6, 30, 55, 15, 9, 54] and ECC [7, 28] are emerging forms of side-channel attacks on exponentiation-based or scalar-multiplication-based algorithms. ...
doi:10.1007/978-3-319-69453-5_6
fatcat:mmyz3ye4a5bhpklp2cda2a6c24
Completing the Complete ECC Formulae with Countermeasures
2017
Journal of Low Power Electronics and Applications
The results show that applying an increasing level of countermeasures leads to an increasing resistance against side-channel attacks. ...
This is the first work looking into side-channel security issues of hardware implementations of the complete formulae. ...
ECC arithmetic on the FPGA, while the authors of Riscure and Radboud mainly worked on the high-level architecture (including countermeasures) and the side-channel evaluation. ...
doi:10.3390/jlpea7010003
fatcat:gujyt7mbsvdcnoqd4qfctnbfd4
SCA-secure ECC in software - mission impossible?
[article]
2021
IACR Cryptology ePrint Archive
This paper describes an ECC implementation computing the X25519 key-exchange protocol on the ARM-Cortex M4 microcontroller. ...
This software comes with extensive mitigations against various side-channel and fault attacks and is, to our best knowledge, the first to claim affordable protection against multiple classes of attacks ...
A class of single-trace attacks is often called horizontal attacks. These attacks trace back to [107] , and was applied against ECC in [12, 28, 50] . ...
dblp:journals/iacr/BatinaCHSS21
fatcat:cjgvyu4mjjegflz32afpgykwfm
A Study on the SCA Trends for Application to IoT Devices
2020
Journal of Internet Services and Information Security
Over the past 20 years, side-channel analysis (SCA) on IC Chip has mainly taken place. ...
In particular, single-trace attacks that only use side-channel information are actively studied; it eliminates the need for information about the input and output values of cryptographic algorithms. ...
Side-Channel Analysis In 1996, Kocher was first presented SCA which uses physical information that occurs when cryptographic algorithms are running on embedded systems [29] . ...
doi:10.22667/jisis.2020.02.29.002
dblp:journals/jisis/SimH20
fatcat:4sjvs66efzfctfw3v5emu7yezi
Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we investigate a practical attack scenario on a randomized ECC hardware implementation suitable for RFID tags. ...
., Elliptic Curve Cryptography (ECC). It is specially important to consider that RFID tags are easily accessible to perform practical side-channel attacks due to their fields of applications. ...
However, since they applied a CPA attack using 1,000 traces, their attack cannot be applied on ECC implementations that use random scalars. ...
doi:10.1007/978-3-642-41332-2_9
fatcat:5cixu7xikjcvxf4nz6jhlr2gse
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
[article]
2019
IACR Cryptology ePrint Archive
However, ECC also has security issues, such as Side-Channel Attacks (SCA), which are a growing threat in the implementation of cryptographic devices. ...
for the future implementation of security mechanisms suitable for embedded devices applied to Internet of Things. ...
Combined Attack, Passive and Active Attack (PACA) Amiel et al. in [5] presents a combined attack on a resistant implementation to side channel of RSA. This attack is easily applied to ECC. ...
dblp:journals/iacr/AbarzuaCL19
fatcat:7g66bmaxhbg7jhzx2fotyboi6m
Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations
[chapter]
2017
Lecture Notes in Computer Science
Single-trace side-channel attacks are a serious threat to elliptic curve cryptography in practice because they can break also cryptosystems where scalars are nonces (e.g., ECDSA). ...
We also show that successful attacks are possible even without knowledge of precomputed values by using clustering instead of correlations. ...
Clustering has been previously used in side-channel attacks on ECC by Heyszl et al. in [31] . ...
doi:10.1007/978-3-319-54669-8_9
fatcat:utkdt6q6rjfmtp43h7xrjrr264
Template Attacks against ECC: practical implementation against Curve25519
2020
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
In addition, our attack requires only one attack trace. ...
Then, a new countermeasure that is efficient against the presented attack will be proposed and tested. This work was carried out on the implementation of mbedTLS from Curve25519. ...
Among physical attacks, we can discern side-channel attacks (SCA). ...
doi:10.1109/host45689.2020.9300261
fatcat:2xw2oq2xsvgunb6x4h7uycoabe
Practical Evaluation of Protected Residue Number System Scalar Multiplication
2018
Transactions on Cryptographic Hardware and Embedded Systems
In this paper, we propose a generic, thorough and analytic evaluation approach for protected scalar multiplication implementations with RNS and traditional Side Channel Attack (SCA) countermeasures in ...
On the security of RNS, our data and location dependent template attacks show that even protected implementations are vulnerable to these attacks. ...
Introduction The security of embedded devices, even devices with dedicated cryptographic processors, is dependent on resilience against side-channel attacks (SCA). ...
doi:10.13154/tches.v2019.i1.259-282
dblp:journals/tches/Papachristodoulou19
fatcat:xvwboicvlbbhlpyk7nfmzjwida
Spread Spectrum Video Data Hiding, Interleaving and Synchronization
[chapter]
2004
Intelligent Watermarking Techniques
One is to correct both random and bursts of errors using 3-D interleaving together with random error correction codes. Another is frame synchronization in hidden data detection. ...
Real-time Implementation Real-time watermark embedding has been implemented on TriMedia processor board and FPGA-based board. ...
Therefore embedding some side-information is a way to achieve synchronization. ...
doi:10.1142/9789812562524_0018
fatcat:rv766byvmfeergdoyeswwxsjwi
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks
2021
Transactions on Cryptographic Hardware and Embedded Systems
Deep Learning based Side-Channel Attacks (DL-SCA) are considered as fundamental threats against secure cryptographic implementations. ...
We also study how an attack's accuracy gain translates to a drastic reduction of the remaining time complexity of a side-channel attacks through multiple scenarios on public-key implementations. ...
It has been developed by CryptoExperts (https://www.cryptoexperts.com/) who deliberately did not include countermeasures against horizontal and address-bit attacks. ...
doi:10.46586/tches.v2021.i3.60-96
fatcat:gvoqvy2a6fh43hixm3hscfeb2a
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study on Public-Key Algorithms -
[article]
2021
IACR Cryptology ePrint Archive
Deep Learning based Side-Channel Attacks (DL-SCA) are considered as fundamental threats against secure cryptographic implementations. ...
We also study how an attack's accuracy gain translates to a drastic reduction of the remaining time complexity of a side-channel attacks through multiple scenarios on public-key implementations. ...
It has been developed by CryptoExperts (https://www.cryptoexperts.com/) who deliberately did not include countermeasures against horizontal and address-bit attacks. ...
dblp:journals/iacr/ZaidBHV21
fatcat:3l73mbjz5revna6sbe6qd7rzou
« Previous
Showing results 1 — 15 out of 382 results