Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing

YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …

A tutorial on physical security and side-channel attacks

F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …

[BUKU][B] Guide to elliptic curve cryptography

D Hankerson, AJ Menezes, S Vanstone - 2004 - books.google.com
After two decades of research and development, elliptic curve cryptography now has
widespread exposure and acceptance. Industry, banking, and government standards are in …

[BUKU][B] Residue number systems

PVA Mohan, PVA Mohan - 2016 - Springer
The design of algorithms and hardware implementation for signal processing systems has
received considerable attention over the last few decades. The primary area of application …

Weierstraß elliptic curves and side-channel attacks

E Brier, M Joye - International workshop on public key cryptography, 2002 - Springer
Recent attacks show how an unskilled implementation of elliptic curve cryptosystems may
reveal the involved secrets from a single execution of the algorithm. Most attacks exploit the …

Very compact FPGA implementation of the AES algorithm

P Chodowiec, K Gaj - … on cryptographic hardware and embedded systems, 2003 - Springer
In this paper a compact FPGA architecture for the AES algorithm with 128-bitkey targeted for
low-costembedded applications is presented. Encryption, decryption and key schedule are …

Twisted Edwards curves revisited

H Hisil, KKH Wong, G Carter, E Dawson - … on the Theory and Application of …, 2008 - Springer
This paper introduces fast algorithms for performing group operations on twisted Edwards
curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a …

A refined power-analysis attack on elliptic curve cryptosystems

L Goubin - International Workshop on Public Key Cryptography, 2002 - Springer
Abstract As Elliptic Curve Cryptosystems are becoming more and more popular and are
included in many standards, an increasing demand has appeared for secure …

Binary edwards curves

DJ Bernstein, T Lange… - … Hardware and Embedded …, 2008 - Springer
This paper presents a new shape for ordinary elliptic curves over fields of characteristic 2.
Using the new shape, this paper presents the first complete addition formulas for binary …

A fast parallel elliptic curve multiplication resistant against side channel attacks

T Izu, T Takagi - International Workshop on Public Key Cryptography, 2002 - Springer
This paper proposes a fast elliptic curve multiplication algorithm applicable for any types of
curves over finite fields F p (pa prime), based on [Mon87], together with criteria which make …