Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures

A Barenghi, L Breveglieri, I Koren… - Proceedings of the …, 2012 - ieeexplore.ieee.org
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …

Hardware designer's guide to fault attacks

D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …

State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures

J Fan, X Guo, E De Mulder… - … oriented security and …, 2010 - ieeexplore.ieee.org
Implementations of cryptographic primitives are vulnerable to physical attacks. While the
adversary only needs to succeed in one out of many attack methods, the designers have to …

An updated survey on secure ECC implementations: Attacks, countermeasures and cost

J Fan, I Verbauwhede - Cryptography and Security: From Theory to …, 2012 - Springer
Unprotected implementations of cryptographic primitives are vulnerable to physical attacks.
While the adversary only needs to succeed in one out of many attack methods, the …

Fault attack on elliptic curve Montgomery ladder implementation

PA Fouque, R Lercier, D Réal… - 2008 5th Workshop on …, 2008 - ieeexplore.ieee.org
In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This
attack is tailored to work on the classical Montgomery ladder method when the y-coordinate …

The fault attack jungle-a classification model to guide you

I Verbauwhede, D Karaklajic… - 2011 Workshop on Fault …, 2011 - ieeexplore.ieee.org
For a secure hardware designer, the vast array of fault attacks and countermeasures looks
like a jungle. This paper aims at providing a guide through this jungle and at hel** a …

An efficient double parameter elliptic curve digital signature algorithm for blockchain

SG Liu, WQ Chen, JL Liu - IEEE Access, 2021 - ieeexplore.ieee.org
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation
in the process of signature and verification, which greatly reduces the efficiency of digital …

A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards

JL Danger, S Guilley, P Hoogvorst, C Murdica… - Journal of Cryptographic …, 2013 - Springer
Elliptic curve cryptography in embedded systems is vulnerable to side-channel attacks.
Those attacks exploit biases in various kinds of leakages, such as power consumption …

Differential attacks on deterministic signatures

C Ambrose, JW Bos, B Fay, M Joye, M Lochter… - Topics in Cryptology–CT …, 2018 - Springer
Deterministic signature schemes are becoming more popular, as illustrated by the
deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need …

A fault attack on ECDSA

JM Schmidt, M Medwed - … on Fault Diagnosis and Tolerance in …, 2009 - ieeexplore.ieee.org
An advantage of schemes based on elliptic curve cryptography (ECC) is that they require a
smaller key size than other public key schemes to guarantee the same level of security …