Electromagnetic (EM) side-channel traces of elliptic curve point multiplication during SM2 decryption in OpenSSL The dataset was used for Test Vector Leakage Assessment (TVLA) of SM2 decryption. The results are presented at ACSAC 2018 (https://www.acsac.org/2018/) in "Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study" (DOI: 10.1145/3274694.3274725). The dataset contains Electromagnetic (EM) side-channel traces of elliptic curve point multiplication during SM2 decryption in OpenSSL. Folders Description EM_traces_before_countermeasures : contains EM traces that were taken on unprotected version of SM2 decryption; EM_traces_after_countermeasures : contains EM traces that were taken after all the countermeasures describ...
Abstract. TinyECC 2.0 is an open source library for Elliptic Curve Cryptography (ECC) in wireless se...
Caractérisation et Utilisation du Rayonnement Electromagnétique pour l'attaque de composants cryptog...
Profiling attacks, especially those based on machine learning, proved to be very successful techniqu...
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatu...
The EM side channel analysis is a very effective technique to attack cryptographic systems due to it...
Since their publication in 1998 and 2001 respectively, Power and Electromagnetic Analysis (SPA, DPA,...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
Abstract Electromagnetic emissions leak confidential data of cryptographic devices. By exploiting su...
High resolution inductive probes enable precise measurements of the electromagnetic field of small r...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
Recent advances in computer hardware security research have shown that electronic devices are vulner...
Cryptographic algorithm is the most commonly used method of information security protection for many...
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented ...
Binary scalar multiplication, which is the main operation of elliptic curve cryptography, is vulnera...
Since their publication in 1998 and 2001 respectively, Power and Electromagnetic Analysis (SPA, DPA,...
Abstract. TinyECC 2.0 is an open source library for Elliptic Curve Cryptography (ECC) in wireless se...
Caractérisation et Utilisation du Rayonnement Electromagnétique pour l'attaque de composants cryptog...
Profiling attacks, especially those based on machine learning, proved to be very successful techniqu...
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatu...
The EM side channel analysis is a very effective technique to attack cryptographic systems due to it...
Since their publication in 1998 and 2001 respectively, Power and Electromagnetic Analysis (SPA, DPA,...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
Abstract Electromagnetic emissions leak confidential data of cryptographic devices. By exploiting su...
High resolution inductive probes enable precise measurements of the electromagnetic field of small r...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
Recent advances in computer hardware security research have shown that electronic devices are vulner...
Cryptographic algorithm is the most commonly used method of information security protection for many...
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented ...
Binary scalar multiplication, which is the main operation of elliptic curve cryptography, is vulnera...
Since their publication in 1998 and 2001 respectively, Power and Electromagnetic Analysis (SPA, DPA,...
Abstract. TinyECC 2.0 is an open source library for Elliptic Curve Cryptography (ECC) in wireless se...
Caractérisation et Utilisation du Rayonnement Electromagnétique pour l'attaque de composants cryptog...
Profiling attacks, especially those based on machine learning, proved to be very successful techniqu...