This paper describes an ECC implementation computing the X25519 keyexchange protocol on the Arm Cortex-M4 microcontroller. For providing protections against various side-channel and fault attacks we first review known attacks and countermeasures, then we provide software implementations that come with extensive mitigations, and finally we present a preliminary side-channel evaluation. To our best knowledge, this is the first public software claiming affordable protection against multiple classes of attacks that are motivated by distinct real-world application scenarios. We distinguish between X25519 with ephemeral keys and X25519 with static keys and show that the overhead to our baseline unprotected implementation is about 37% and 243%, re...
The wide number and variety of side-channel attacks against scalar multiplication algorithms makes t...
The number of smart devices connected to the Internet is growing at an enormous pace and will reach ...
Since their invention in the mid 1980s, Elliptic Curve Cryptosystems (ECC) have become an alternativ...
This paper describes an ECC implementation computing the X25519 keyexchange protocol on the Arm Cort...
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attac...
<p>Evaluating security vulnerabilities of software implementations at design step is of primary impo...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
Information security heavily relies on integrated circuits (ICs). Unfortunately, ICs face a lot of t...
Abstract. Elliptic Curve Cryptography implementations are known to be vulnerable to various side-cha...
Modern side-channel attacks (SCA) have the ability to reveal sensitive data from non-protected hardw...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
International audienceScalar multiplication is the main operation in elliptic curve cryptography. In...
Abstract. Fault injection attacks are a real-world threat to cryptosys-tems, in particular asymmetri...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
This paper presents implementation results of several side channel countermeasures for protecting th...
The wide number and variety of side-channel attacks against scalar multiplication algorithms makes t...
The number of smart devices connected to the Internet is growing at an enormous pace and will reach ...
Since their invention in the mid 1980s, Elliptic Curve Cryptosystems (ECC) have become an alternativ...
This paper describes an ECC implementation computing the X25519 keyexchange protocol on the Arm Cort...
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attac...
<p>Evaluating security vulnerabilities of software implementations at design step is of primary impo...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
Information security heavily relies on integrated circuits (ICs). Unfortunately, ICs face a lot of t...
Abstract. Elliptic Curve Cryptography implementations are known to be vulnerable to various side-cha...
Modern side-channel attacks (SCA) have the ability to reveal sensitive data from non-protected hardw...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
International audienceScalar multiplication is the main operation in elliptic curve cryptography. In...
Abstract. Fault injection attacks are a real-world threat to cryptosys-tems, in particular asymmetri...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
This paper presents implementation results of several side channel countermeasures for protecting th...
The wide number and variety of side-channel attacks against scalar multiplication algorithms makes t...
The number of smart devices connected to the Internet is growing at an enormous pace and will reach ...
Since their invention in the mid 1980s, Elliptic Curve Cryptosystems (ECC) have become an alternativ...