Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attacks on secret exponents are typically bound to the leakage of single executions due to cryptographic protocols or side-channel countermeasures such as blinding. We propose for the first time, to use a well-established class of algorithms, i.e. unsupervised cluster classification algorithms such as the k-means algorithm to attack cryptographic exponentiations and recover secret exponents without any prior profiling, manual tuning or leakage models. Not requiring profiling is of significant advantage to attackers, as are well-established algorithms. The proposed non-profiled single-execution attack is able to exploit any available single-executi...
Abstract. Embedded devices implementing cryptographic services are the result of a trade-off between...
Simple power analysis (SPA) attacks are widely used against several cryptosystems, principally again...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
The success probability of side-channel attacks depends on the used measurement techniques as well a...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
High resolution inductive probes enable precise measurements of the electromagnetic field of small r...
International audienceCountermeasures to defeat most of side-channel attacks onexponentiations are b...
International audienceSide-channel analysis has become a very powerful tool helpful for attackers tr...
Exponent blinding is known as a secure countermeasure against side-channel attacks. If single power ...
Embedded exponentiation techniques have become a key concern for security and efficiency in hardware d...
International audienceWe address the problem of speeding up group computations in cryptography using...
International audienceWe introduce in this paper a technique in which we apply correlation analysis ...
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat ...
International audienceThe elliptic curve cryptography (ECC) is relevant in embedded systems, since i...
This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protecte...
Abstract. Embedded devices implementing cryptographic services are the result of a trade-off between...
Simple power analysis (SPA) attacks are widely used against several cryptosystems, principally again...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
The success probability of side-channel attacks depends on the used measurement techniques as well a...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
High resolution inductive probes enable precise measurements of the electromagnetic field of small r...
International audienceCountermeasures to defeat most of side-channel attacks onexponentiations are b...
International audienceSide-channel analysis has become a very powerful tool helpful for attackers tr...
Exponent blinding is known as a secure countermeasure against side-channel attacks. If single power ...
Embedded exponentiation techniques have become a key concern for security and efficiency in hardware d...
International audienceWe address the problem of speeding up group computations in cryptography using...
International audienceWe introduce in this paper a technique in which we apply correlation analysis ...
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat ...
International audienceThe elliptic curve cryptography (ECC) is relevant in embedded systems, since i...
This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protecte...
Abstract. Embedded devices implementing cryptographic services are the result of a trade-off between...
Simple power analysis (SPA) attacks are widely used against several cryptosystems, principally again...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...