Horizontal address-bit DPA against montgomery kP implementation

I Kabin, Z Dyka, D Kreiser… - … Computing and FPGAs …, 2017 - ieeexplore.ieee.org
With the advent of the Internet of Things security features become more and more important.
Especially data integrity and authentication of its origin are of utmost importance. Digital …

Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice

I Kabin, Z Dyka, D Klann, M Aftowicz… - Journal of Electronic …, 2021 - Springer
The Montgomery kP algorithm ie the Montgomery ladder is reported in literature as resistant
against simple SCA due to the fact that the processing of each key bit value of the scalar k is …

Inherent resistance of efficient ECC designs against SCA attacks

Z Dyka, EA Bock, I Kabin… - 2016 8th IFIP …, 2016 - ieeexplore.ieee.org
The Montgomery kP algorithm using Lopez-Dahab projective coordinates is a time and
energy efficient way to perform the elliptic curve point multiplication. It even can provide …

FPGA implementation of ECC: low-cost countermeasure against horizontal bus and address-bit SCA

I Kabin, D Kreiser, Z Dyka… - … Computing and FPGAs …, 2018 - ieeexplore.ieee.org
Designing tamper resistant implementation of cryptographic operations is a tricky and
complex task. In this paper we discuss the addressing in hardware implementations, that …

Horizontal DPA attacks against ECC: impact of implemented field multiplication formula

I Kabin, Z Dyka, D Klann… - 2019 14th International …, 2019 - ieeexplore.ieee.org
Due to the nature of applications such as critical infrastructure and the Internet of Things etc.
side channel analysis attacks are becoming a serious threat. Side channel analysis attacks …

Non-profiled semi-supervised horizontal attack against Elliptic Curve Scalar Multiplication using Support Vector Machines

M Aftowicz, I Kabin, Z Dyka… - 2023 26th Euromicro …, 2023 - ieeexplore.ieee.org
There are different ways to leverage Side Channel information into a successful attack
against cryptographic hardware. The most constraint attack scenario assumes no …

Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks

I Kabin, Z Dyka, D Kreiser… - 2017 IEEE East-West …, 2017 - ieeexplore.ieee.org
In this paper we investigate how different randomization approaches influence the success
of horizontal DPA attacks. We use our own ECC design to run the experiments. We applied …

Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods

I Kabin, M Aftowicz, Y Varabei, D Klann… - 2019 10th IFIP …, 2019 - ieeexplore.ieee.org
AI means are widely used to detect correlations in large data sets. This makes them an ideal
candidate to improve side channel analysis attacks as the core feature if these attacks is to …

Horizontal SCA Attacks against Algorithm Using K-Means and PCA

M Aftowicz, I Kabin, D Klann, Y Varabei… - 2020 9th …, 2020 - ieeexplore.ieee.org
Side Channel Analysis attacks consist in, ia, exploiting the information leaked from the
implementations of cryptographic algorithms. In this paper we describe two key revealing …

On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack

I Kabin, A Sosa, Z Dyka, D Klann… - 2019 International …, 2019 - ieeexplore.ieee.org
This paper reports about the impact of compiler options on the resistance of cryptographic
implementations against side channel analysis attacks. We evaluated four compiler option …