Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …
due to the increasing demand for secure transmission of confidential information. Although …
Hardware designer's guide to fault attacks
D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …
intensive cryptographic algorithms onto constrained embedded devices to match the …
State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures
Implementations of cryptographic primitives are vulnerable to physical attacks. While the
adversary only needs to succeed in one out of many attack methods, the designers have to …
adversary only needs to succeed in one out of many attack methods, the designers have to …
An updated survey on secure ECC implementations: Attacks, countermeasures and cost
Unprotected implementations of cryptographic primitives are vulnerable to physical attacks.
While the adversary only needs to succeed in one out of many attack methods, the …
While the adversary only needs to succeed in one out of many attack methods, the …
Fault attack on elliptic curve Montgomery ladder implementation
In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This
attack is tailored to work on the classical Montgomery ladder method when the y-coordinate …
attack is tailored to work on the classical Montgomery ladder method when the y-coordinate …
The fault attack jungle-a classification model to guide you
I Verbauwhede, D Karaklajic… - 2011 Workshop on Fault …, 2011 - ieeexplore.ieee.org
For a secure hardware designer, the vast array of fault attacks and countermeasures looks
like a jungle. This paper aims at providing a guide through this jungle and at hel** a …
like a jungle. This paper aims at providing a guide through this jungle and at hel** a …
An efficient double parameter elliptic curve digital signature algorithm for blockchain
SG Liu, WQ Chen, JL Liu - IEEE Access, 2021 - ieeexplore.ieee.org
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation
in the process of signature and verification, which greatly reduces the efficiency of digital …
in the process of signature and verification, which greatly reduces the efficiency of digital …
A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards
Elliptic curve cryptography in embedded systems is vulnerable to side-channel attacks.
Those attacks exploit biases in various kinds of leakages, such as power consumption …
Those attacks exploit biases in various kinds of leakages, such as power consumption …
Differential attacks on deterministic signatures
Deterministic signature schemes are becoming more popular, as illustrated by the
deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need …
deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need …
A fault attack on ECDSA
An advantage of schemes based on elliptic curve cryptography (ECC) is that they require a
smaller key size than other public key schemes to guarantee the same level of security …
smaller key size than other public key schemes to guarantee the same level of security …