Resilience in the Cyberworld: Definitions, Features and Models
E Vogel, Z Dyka, D Klann, P Langendörfer - Future Internet, 2021 - mdpi.com
Resilience is a feature that is gaining more and more attention in computer science and
computer engineering. However, the definition of resilience for the cyber landscape …
computer engineering. However, the definition of resilience for the cyber landscape …
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks
Elliptic curve cryptography (ECC) is one of the commonly used standard methods for
encrypting and signing messages which is especially applicable to resource-constrained …
encrypting and signing messages which is especially applicable to resource-constrained …
One truth prevails: A deep-learning based single-trace power analysis on RSA–CRT with windowed exponentiation
In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–
CRT software implementation is proposed. Our method is applied to a side-channel-aware …
CRT software implementation is proposed. Our method is applied to a side-channel-aware …
Horizontal Attacks against ECC: from Simulations to ASIC
In this paper we analyse the impact of different compile options on the success rate of side
channel analysis attacks. We run horizontal differential side channel attacks against …
channel analysis attacks. We run horizontal differential side channel attacks against …
Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice
The Montgomery kP algorithm ie the Montgomery ladder is reported in literature as resistant
against simple SCA due to the fact that the processing of each key bit value of the scalar k is …
against simple SCA due to the fact that the processing of each key bit value of the scalar k is …
Distinguishability investigation on Longa's atomic patterns when used as a basis for implementing elliptic curve scalar multiplication algorithms
SH Li - arXiv preprint arXiv:2409.13742, 2024 - arxiv.org
In the evolving landscape of cryptographic security, the robustness of Elliptic Curve
Cryptography (ECC) against side-channel analysis (SCA) attacks is of paramount …
Cryptography (ECC) against side-channel analysis (SCA) attacks is of paramount …
Efficient and secure algorithm: the application and improvement of ECDSA
Y Shang - 2022 International Conference on Big Data …, 2022 - ieeexplore.ieee.org
As a currently widely used digital signature algorithm, ECDSA is more efficient than RSA.
Specifically, ECDSA provides a shorter key than RSA in the same security level. This makes …
Specifically, ECDSA provides a shorter key than RSA in the same security level. This makes …
[HTML][HTML] Methods increasing inherent resistance of ECC designs against horizontal attacks
Due to the nature of applications such as critical infrastructure and the Internet of Things etc.
side channel analysis attacks are becoming a serious threat. Side channel analysis attacks …
side channel analysis attacks are becoming a serious threat. Side channel analysis attacks …
Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA
The resistance of cryptographic implementations against SCA attacks is highly important if
devices are physically accessible. The vulnerability of public key approaches to address-bit …
devices are physically accessible. The vulnerability of public key approaches to address-bit …
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves
In this paper we report on the results of selected horizontal SCA attacks against two open-
source designs that implement hardware accelerators for elliptic curve cryptography. Both …
source designs that implement hardware accelerators for elliptic curve cryptography. Both …