A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Chosen Base-Point Side-Channel Attack on Montgomery Ladder with x-only coordinate: with Application to secp256k1
2020
IET Information Security
This study revisits the side-channel security of the elliptic curve cryptography (ECC) scalar multiplication implemented with Montgomery ladder. Focusing on a specific implementation that does not use the y-coordinate for point addition (ECADD) and point doubling (ECDBL), the authors show that Montgomery ladder on Weierstrass curves is vulnerable to a chosen basepoint attack. Unlike the normal implementation with y-coordinate, in the scenario of this study, the chosen base-point strategy will
doi:10.1049/iet-ifs.2018.5228
fatcat:4opjklptgjhh5nugdr6fedvz64