This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to virtually any algorithm. In particular, we present several novel exponentiation algorithms, namely, a protected square-and-multiply algorithm, its right-to-left counterpart, and several protected sliding-window algorithms. We also illustrate our methodology applied to point multiplication on elliptic curves. All these algorithms share the common feature that the complexity is globally unchanged compared to the corresponding unprotected implementations
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...
Unified point addition for computing elliptic curve point addition and doubling is considered to be ...
Abstract—This paper introduces simple methods to convert a cryptographic algorithm into an algorithm...
Elliptic-curve implementations protected with state-of-the-art countermeasures against side-channel ...
International audienceNowadays, horizontal or single-shot side-channel attacks against protected imp...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
International audienceEmbedded exponentiation techniques have become a key concern for security and ...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
Abstract. Embedded devices implementing cryptographic services are the result of a trade-off between...
Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attac...
In the execution on a smart card, side channel attacks such as the simple power analysis (SPA) and t...
Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...
Unified point addition for computing elliptic curve point addition and doubling is considered to be ...
Abstract—This paper introduces simple methods to convert a cryptographic algorithm into an algorithm...
Elliptic-curve implementations protected with state-of-the-art countermeasures against side-channel ...
International audienceNowadays, horizontal or single-shot side-channel attacks against protected imp...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
International audienceEmbedded exponentiation techniques have become a key concern for security and ...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
Abstract. Embedded devices implementing cryptographic services are the result of a trade-off between...
Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attac...
In the execution on a smart card, side channel attacks such as the simple power analysis (SPA) and t...
Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...
Unified point addition for computing elliptic curve point addition and doubling is considered to be ...