Scalar multiplication, which computes dP for a given point P and a scalar d, is the dominant computation part of Elliptic Curve Cryptosystems (ECC). Recently, Side Channel Attacks (SCA) on scalar multiplication have become real threats. This is why secure and efficient scalar multiplication is important for ECC, and many countermeasures have been proposed so far. The Montgomery Ladder and the Regular right-to-left algorithm are the simplest and the most elegant algorithms. However, they are vulnerable to an SCA on the Least Significant Bit (LSB). In this paper, we investigate how to enhance the LSB security without spoiling the original features of simplicity. Our elegant techniques make the previous schemes secure against the SCA on LSB, w...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
Binary scalar multiplication, which is the main operation of elliptic curve cryptography, is vulnera...
International audienceEmbedded systems are increasingly providing secure functionalities, which ofte...
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The clas...
The wide number and variety of side-channel attacks against scalar multiplication algorithms makes t...
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable ...
International audienceA large number of embedded systems require a high level of security. Elliptic ...
International audienceTwo types of physical attacks are considered as important threats for embedded...
We aim to simplify the worst-case horizontal attack on scalar multiplication published at CHES 2017 ...
Abstract—Side Channel Attack(SCA) allow an adversary to reveal partial information or exact value of...
Abstract. Embedded devices implementing cryptographic services are the result of a trade-off between...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
Binary scalar multiplication, which is the main operation of elliptic curve cryptography, is vulnera...
International audienceEmbedded systems are increasingly providing secure functionalities, which ofte...
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The clas...
The wide number and variety of side-channel attacks against scalar multiplication algorithms makes t...
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable ...
International audienceA large number of embedded systems require a high level of security. Elliptic ...
International audienceTwo types of physical attacks are considered as important threats for embedded...
We aim to simplify the worst-case horizontal attack on scalar multiplication published at CHES 2017 ...
Abstract—Side Channel Attack(SCA) allow an adversary to reveal partial information or exact value of...
Abstract. Embedded devices implementing cryptographic services are the result of a trade-off between...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...