Breaking ed25519 in wolfssl

N Samwel, L Batina, G Bertoni, J Daemen… - Topics in Cryptology–CT …, 2018 - Springer
Ed25519 is an instance of the Elliptic Curve based signature scheme EdDSA that was
recently introduced to solve an inconvenience of the more established ECDSA. Namely …

Correlation power analysis of lightweight block ciphers: From theory to practice

A Biryukov, D Dinu, J Großschädl - … , ACNS 2016, Guildford, UK, June 19 …, 2016 - Springer
Abstract Side-Channel Analysis (SCA) represents a serious threat to the security of millions
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …

Bricklayer attack: a side-channel analysis on the ChaCha quarter round

A Adomnicai, JJA Fournier, L Masson - International Conference on …, 2017 - Springer
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this
paper, we present electromagnetic side-channel analyses for two different software …

Efficient side-channel protections of ARX ciphers

B Jungk, R Petri, M Stöttinger - Cryptology ePrint Archive, 2018 - eprint.iacr.org
The current state of the art of Boolean masking for the modular addition operation in
software has a very high performance overhead. Firstly, the instruction count is very high …

Examining the practical side channel resilience of arx-boxes

Y Yan, E Oswald - Proceedings of the 16th ACM International …, 2019 - dl.acm.org
Implementations of ARX ciphers are hoped to have some intrinsic side channel resilience
owing to the specific choice of cipher components: modular addition (A), rotation (R) and …

Efficient and secure implementations of lightweight symmetric cryptographic primitives

DD Dinu - 2017 - orbilu.uni.lu
[en] This thesis is devoted to efficient and secure implementations of lightweight symmetric
cryptographic primitives for resource-constrained devices such as wireless sensors and …

An analytic attack against ARX addition exploiting standard side-channel leakage

Y Yan, E Oswald, S Vivek - Cryptology ePrint Archive, 2020 - eprint.iacr.org
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation,
exclusive-or) ciphers, have gained popularity in part because of their non-linear operation's …

A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

A Guinet, G Land, IG Bucur… - IACR Transactions on …, 2024 - icscm.ub.rub.de
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to
retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic …

[PDF][PDF] Side Channel Attacks on IoT Applications

Y Yan, Y Yan - Conference on Embedded Wireless …, 2013 - research-information.bris.ac.uk
Abstract The Internet of Things (IoT) has become a reality: small connected devices feature
in everyday objects including childrens' toys, TVs, fridges, heating control units, etc. Supply …

Microarchitectural Side-Channel Attacks

JF Gallais - 2013 - orbilu.uni.lu
[en] Cryptanalysis is the science which evaluates the security of a cryptosystem and detects
its weaknesses and flaws. Initially confined to the black-box model, where only the input and …