International audienceTwo types of physical attacks are considered as important threats for embedded crypto-processors: observation attacks (or side channel attacks) and perturbation attacks (or fault injection attacks). In this work, we focus on protections against both types of attacks simultaneously for scalar multiplication in elliptic curve cryptography (ECC). A common protection against fault attacks on ECC is to verify if the current egular scalar multiplication using verifications at various frequency checking for some coordinate types. To protect the scalar, we added various methods based on iteration counters. We combined and tested these two countermeasures on different coordinates types for Weierstrass curves
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Unprotected implementations of cryptographic primitives are vulnerable to physical attacks. While th...
Abstract—Implementations of cryptographic primitives are vulnerable to physical attacks. While the a...
International audienceTwo types of physical attacks are considered as important threats for embedded...
International audienceScalar multiplication is the main operation in elliptic curve cryptography. In...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
Abstract. Fault injection attacks are a real-world threat to cryptosys-tems, in particular asymmetri...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
International audienceA large number of embedded systems require a high level of security. Elliptic ...
International audienceEmbedded systems are increasingly providing secure functionalities, which ofte...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Unprotected implementations of cryptographic primitives are vulnerable to physical attacks. While th...
Abstract—Implementations of cryptographic primitives are vulnerable to physical attacks. While the a...
International audienceTwo types of physical attacks are considered as important threats for embedded...
International audienceScalar multiplication is the main operation in elliptic curve cryptography. In...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
This thesis deals with protection development and evaluation against fault attacks (FA) and side cha...
Abstract. Fault injection attacks are a real-world threat to cryptosys-tems, in particular asymmetri...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
International audienceElliptic Curves Cryptography (ECC) tends to replace RSA for public key cryptog...
International audienceA large number of embedded systems require a high level of security. Elliptic ...
International audienceEmbedded systems are increasingly providing secure functionalities, which ofte...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Abstract. We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Chan...
Unprotected implementations of cryptographic primitives are vulnerable to physical attacks. While th...
Abstract—Implementations of cryptographic primitives are vulnerable to physical attacks. While the a...