+

Nascimento et al., 2016 - Google Patents

Attacking embedded ECC implementations through cmov side channels

Nascimento et al., 2016

View PDF
Document ID
11951023943347790833
Author
Nascimento E
Chmielewski
Oswald D
Schwabe P
Publication year
Publication venue
International Conference on Selected Areas in Cryptography

External Links

Snippet

Side-channel attacks against implementations of elliptic-curve cryptography have been extensively studied in the literature and a large tool-set of countermeasures is available to thwart different attacks in different contexts. The current state of the art in attacks and …
Continue reading at research.birmingham.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/726Inversion; Reciprocal calculation; Division of elements of a finite field
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • G06F19/22Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology for sequence comparison involving nucleotides or amino acids, e.g. homology search, motif or SNP [Single-Nucleotide Polymorphism] discovery or sequence alignment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
Nascimento et al. Attacking embedded ECC implementations through cmov side channels
Carbone et al. Deep learning to evaluate secure RSA implementations
Aranha et al. LadderLeak: Breaking ECDSA with less than one bit of nonce leakage
Fan et al. An updated survey on secure ECC implementations: Attacks, countermeasures and cost
CN107040362B (en) Modular multiplication apparatus and method
Bauer et al. Horizontal collision correlation attack on elliptic curves: –Extended Version–
EP2974094B1 (en) Asymmetrically masked multiplication
Nascimento et al. Applying horizontal clustering side-channel attacks on embedded ECC implementations
Kaufmann et al. When constant-time source yields variable-time binary: Exploiting curve25519-donna built with MSVC 2015
US9400636B2 (en) Apparatus and method for calculating a result in a scalar multiplication
US10431123B2 (en) Method for testing and hardening software applications
Perin et al. Attacking randomized exponentiations using unsupervised learning
Dugardin et al. Dismantling real-world ECC with horizontal and vertical template attacks
Järvinen et al. Single-trace side-channel attacks on scalar multiplications with precomputations
KR20140046568A (en) Method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis and system thereof
Steffen et al. Breaking and protecting the crystal: Side-channel analysis of dilithium in hardware
Poussier et al. A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
Sim et al. A study on the side-channel analysis trends for application to IoT devices
Roelofs et al. Online Template Attack on ECDSA: Extracting keys via the other side
Ahmed et al. Deep learning method for power side-channel analysis on chip leakages
Zhou et al. A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
Genêt et al. Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of cortex-M4 SIKE
Fournaris Fault and power analysis attack protection techniques for standardized public key cryptosystems
Bae et al. Instruction fault attack on the miller algorithm in a pairing-based cryptosystem
EP3726772A1 (en) Apparatus and method for randomizing key bit variables of public key encryption algorithm
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载