Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks

I Kabin, Z Dyka, P Langendoerfer - Sensors, 2022 - mdpi.com
Elliptic curve cryptography (ECC) is one of the commonly used standard methods for
encrypting and signing messages which is especially applicable to resource-constrained …

[HTML][HTML] Resilience in the Cyberworld: Definitions, Features and Models

E Vogel, Z Dyka, D Klann, P Langendörfer - Future Internet, 2021 - mdpi.com
Resilience is a feature that is gaining more and more attention in computer science and
computer engineering. However, the definition of resilience for the cyber landscape …

Horizontal Attacks against ECC: from Simulations to ASIC

I Kabin, Z Dyka, D Klann, P Langendoerfer - Computer Security: ESORICS …, 2020 - Springer
In this paper we analyse the impact of different compile options on the success rate of side
channel analysis attacks. We run horizontal differential side channel attacks against …

One truth prevails: A deep-learning based single-trace power analysis on RSA–CRT with windowed exponentiation

K Saito, A Ito, R Ueno, N Homma - IACR Transactions on …, 2022 - tosc.iacr.org
In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–
CRT software implementation is proposed. Our method is applied to a side-channel-aware …

[PDF][PDF] Horizontal address-bit SCA attacks against ECC and appropriate countermeasures

I Kabin - 2023 - opus4.kobv.de
In this work we investigated the resistance of different kP implementations based on the
Montgomery ladder against horizontal, ie single trace, attacks. Applying statistical methods …

Efficient and secure algorithm: The application and improvement of ECDSA

Y Shang - 2022 International Conference on Big Data …, 2022 - ieeexplore.ieee.org
As a currently widely used digital signature algorithm, ECDSA is more efficient than RSA.
Specifically, ECDSA provides a shorter key than RSA in the same security level. This makes …

Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA

I Kabin, Z Dyka, P Langendoerfer - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The resistance of cryptographic implementations against SCA attacks is highly important if
devices are physically accessible. The vulnerability of public key approaches to address-bit …

Resistance of the montgomery ladder against simple sca: Theory and practice

I Kabin, Z Dyka, D Klann, M Aftowicz… - Journal of Electronic …, 2021 - Springer
The Montgomery kP algorithm ie the Montgomery ladder is reported in literature as resistant
against simple SCA due to the fact that the processing of each key bit value of the scalar k is …

[HTML][HTML] Methods increasing inherent resistance of ECC designs against horizontal attacks

I Kabin, Z Dyka, D Klann, P Langendoerfer - Integration, 2020 - Elsevier
Due to the nature of applications such as critical infrastructure and the Internet of Things etc.
side channel analysis attacks are becoming a serious threat. Side channel analysis attacks …

Exploiting static power consumption in side-channel analysis

I Kabin, P Langendoerfer, Z Dyka - 2024 IEEE 25th Latin …, 2024 - ieeexplore.ieee.org
Nowadays, CMOS is the dominant technology for integrated circuits fabrication due to its low
power consumption and scalability. Power consumption in CMOS devices consists of …