The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication component is considered to be highly susceptible to side-channel attacks (SCAs) because it consumes the most power and leaks the most information. In this work, we design a robust asynchronous circuit for scalar multiplication that is resistant to state-of-the-art timing, power, and fault analysis attacks. We leverage the genetic algorithm with multi-objective fitness function to generate a standard Boolean logic-based combinational circuit for scalar multiplication. We transform this circuit into...
As internet connectivity becomes more and more ubiquitous and the number of embedded devices that ar...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
National audienceEnsuring uniform computation profiles is an efficient protection against some side ...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
Elliptic curve cryptography (ECC) is an ideal choice for low-resource applications because it provid...
International audienceEmbedded systems are increasingly providing secure functionalities, which ofte...
Theoretical thesis.Bibliography: pages 207-215.1. Introduction -- 2. Background -- 3. RNS arithmetic...
The Elliptic Curve Digital Signature Algorithm(ECDSA) is the analog to the Digital Signature Algorit...
Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmi...
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attac...
Elliptic Curve Cryptography (ECC) is one of the most popular public-key cryptosystems (PKC) today. R...
As internet connectivity becomes more and more ubiquitous and the number of embedded devices that ar...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
National audienceEnsuring uniform computation profiles is an efficient protection against some side ...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
Elliptic curve cryptography (ECC) is an ideal choice for low-resource applications because it provid...
International audienceEmbedded systems are increasingly providing secure functionalities, which ofte...
Theoretical thesis.Bibliography: pages 207-215.1. Introduction -- 2. Background -- 3. RNS arithmetic...
The Elliptic Curve Digital Signature Algorithm(ECDSA) is the analog to the Digital Signature Algorit...
Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmi...
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attac...
Elliptic Curve Cryptography (ECC) is one of the most popular public-key cryptosystems (PKC) today. R...
As internet connectivity becomes more and more ubiquitous and the number of embedded devices that ar...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
National audienceEnsuring uniform computation profiles is an efficient protection against some side ...