Fault injection attacks are a real-world threat to cryptosystems, in particular asymmetric cryptography. In this paper, we focus on countermeasures which guarantee the integrity of the computation result, hence covering most existing and future fault attacks. Namely, we study the modular extension protection scheme in previously existing and newly contributed variants of the countermeasure on elliptic curve scalar multiplication (ECSM) algorithms. We find that an existing countermeasure is incorrect and we propose new “test-free” variant of the modular extension scheme that fixes it. We then formally prove the correctness and security of modular extension: specifically, the fault non-detection probability is inversely proportional to the se...
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pus...
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. ...
ECDSA is one of the most important public-key signature scheme, however it is vulnerable to lattice ...
Abstract. Fault injection attacks are a real-world threat to cryptosys-tems, in particular asymmetri...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The Refined Power Analysis, Zero-Value Point, and Exceptional Procedure attacks introduced side-chan...
International audienceTwo types of physical attacks are considered as important threats for embedded...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
Elliptic curve cryptosystems (ECCs) are utilised as an alternative to traditional public-key cryptos...
Recently, several research groups in cryptography have presented new elliptic curve model based on E...
Elliptic Curve Cryptosystems (ECCs) are utilized as an alternative to traditional public-key cryptos...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pus...
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. ...
ECDSA is one of the most important public-key signature scheme, however it is vulnerable to lattice ...
Abstract. Fault injection attacks are a real-world threat to cryptosys-tems, in particular asymmetri...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The Refined Power Analysis, Zero-Value Point, and Exceptional Procedure attacks introduced side-chan...
International audienceTwo types of physical attacks are considered as important threats for embedded...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
Elliptic curve cryptosystems (ECCs) are utilised as an alternative to traditional public-key cryptos...
Recently, several research groups in cryptography have presented new elliptic curve model based on E...
Elliptic Curve Cryptosystems (ECCs) are utilized as an alternative to traditional public-key cryptos...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pus...
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. ...
ECDSA is one of the most important public-key signature scheme, however it is vulnerable to lattice ...