International audienceIn this paper, we present a new fault attack on elliptic curve scalar product algorithms. This attack is tailored to work on the classical Montgomery ladder method when the $y$-coordinate is not used. No weakness has been reported so far on such implementations, which are very efficient and were promoted by several authors. But taking into account the twist of the elliptic curves, we show how, with few faults (around one or two faults), we can retrieve the full secret exponent even if classical countermeasures are employed to prevent fault attacks. It turns out that this attack has not been anticipated as the security of the elliptic curve parameters in most standards can be strongly reduced. Especially, the attack is ...
International audienceA large number of embedded systems require a high level of security. Elliptic ...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
International audienceIn this paper, we present a new fault attack on elliptic curve scalar product ...
In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This attac...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
International audienceThis paper introduces a new profiling attack that targets elliptic curves-base...
International audienceThis paper presents a new type of fault attacks on elliptic curves cryptosyste...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fa...
International audienceTwo types of physical attacks are considered as important threats for embedded...
In a fault attack, errors are induced during the computation of a cryptographic primitive, and the f...
International audienceA large number of embedded systems require a high level of security. Elliptic ...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
International audienceIn this paper, we present a new fault attack on elliptic curve scalar product ...
In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This attac...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
International audienceThis paper introduces a new profiling attack that targets elliptic curves-base...
International audienceThis paper presents a new type of fault attacks on elliptic curves cryptosyste...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fa...
International audienceTwo types of physical attacks are considered as important threats for embedded...
In a fault attack, errors are induced during the computation of a cryptographic primitive, and the f...
International audienceA large number of embedded systems require a high level of security. Elliptic ...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...