Attacking embedded ECC implementations through cmov side channels
E Nascimento, Ł Chmielewski, D Oswald… - … Conference on Selected …, 2016 - Springer
Side-channel attacks against implementations of elliptic-curve cryptography have been
extensively studied in the literature and a large tool-set of countermeasures is available to …
extensively studied in the literature and a large tool-set of countermeasures is available to …
Leaky noise: New side-channel attack vectors in mixed-signal IoT devices
Microcontrollers and SoC devices have widely been used in Internet of Things applications.
This also brings the question whether they lead to new security threats unseen in traditional …
This also brings the question whether they lead to new security threats unseen in traditional …
Applying thermal side-channel attacks on asymmetric cryptography
A Aljuffri, M Zwalua, CRW Reinbrecht… - … Transactions on Very …, 2021 - ieeexplore.ieee.org
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from
electronic devices. Several physical leakage sources can be exploited in SCAs, such as …
electronic devices. Several physical leakage sources can be exploited in SCAs, such as …
Applying horizontal clustering side-channel attacks on embedded ECC implementations
E Nascimento, Ł Chmielewski - … Conference on Smart Card Research and …, 2017 - Springer
Side-channel attacks are a threat to cryptographic algorithms running on embedded
devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are …
devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are …
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning
While IoT technology makes industries, cities, and homes smarter, it also opens the door to
security risks. With the right equipment and physical access to the devices, the attacker can …
security risks. With the right equipment and physical access to the devices, the attacker can …
SPA-GPT: general pulse tailor for simple power analysis based on reinforcement learning
Z Wang, Y Ding, A Wang, Y Zhang, C Wei… - IACR Transactions on …, 2024 - tosc.iacr.org
In side-channel analysis of public-key algorithms, we usually classify operations based on
the differences in power traces produced by different basic operations (such as modular …
the differences in power traces produced by different basic operations (such as modular …
Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of cortex-M4 SIKE
A Genêt, N Kaluđerović - … on Constructive Side-Channel Analysis and …, 2022 - Springer
In this paper, the recommended implementation of the post-quantum key exchange SIKE for
Cortex-M4 is attacked through power analysis with a single trace by clustering with the k …
Cortex-M4 is attacked through power analysis with a single trace by clustering with the k …
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
Abstract At Eurocrypt 2022, May et al. proposed a partial key exposure (PKE) attack on CRT-
RSA that efficiently factors N knowing only a 1 3-fraction of either most significant bits …
RSA that efficiently factors N knowing only a 1 3-fraction of either most significant bits …
Finding the needle in the haystack: Metrics for best trace selection in unsupervised side-channel attacks on blinded RSA
A Kulow, T Schamberger… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
For asymmetric ciphers, such as RSA and ECC, side-channel attacks on the underlying
exponentiation are mitigated by countermeasures like constant-time implementation and …
exponentiation are mitigated by countermeasures like constant-time implementation and …
[PDF][PDF] A study on the side-channel analysis trends for application to IoT devices
B Sim, D Han - J. Internet Serv. Inf. Secur, 2020 - jisis.org
Over the past 20 years, side-channel analysis (SCA) on IC Chip has mainly taken place.
However, recently, there has been an increasing number of issues of SCAs on the Internet of …
However, recently, there has been an increasing number of issues of SCAs on the Internet of …