Breaking ed25519 in wolfssl
Ed25519 is an instance of the Elliptic Curve based signature scheme EdDSA that was
recently introduced to solve an inconvenience of the more established ECDSA. Namely …
recently introduced to solve an inconvenience of the more established ECDSA. Namely …
Correlation power analysis of lightweight block ciphers: From theory to practice
Abstract Side-Channel Analysis (SCA) represents a serious threat to the security of millions
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …
Bricklayer attack: a side-channel analysis on the ChaCha quarter round
A Adomnicai, JJA Fournier, L Masson - International Conference on …, 2017 - Springer
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this
paper, we present electromagnetic side-channel analyses for two different software …
paper, we present electromagnetic side-channel analyses for two different software …
Efficient side-channel protections of ARX ciphers
The current state of the art of Boolean masking for the modular addition operation in
software has a very high performance overhead. Firstly, the instruction count is very high …
software has a very high performance overhead. Firstly, the instruction count is very high …
Examining the practical side channel resilience of arx-boxes
Implementations of ARX ciphers are hoped to have some intrinsic side channel resilience
owing to the specific choice of cipher components: modular addition (A), rotation (R) and …
owing to the specific choice of cipher components: modular addition (A), rotation (R) and …
Efficient and secure implementations of lightweight symmetric cryptographic primitives
DD Dinu - 2017 - orbilu.uni.lu
[en] This thesis is devoted to efficient and secure implementations of lightweight symmetric
cryptographic primitives for resource-constrained devices such as wireless sensors and …
cryptographic primitives for resource-constrained devices such as wireless sensors and …
An analytic attack against ARX addition exploiting standard side-channel leakage
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation,
exclusive-or) ciphers, have gained popularity in part because of their non-linear operation's …
exclusive-or) ciphers, have gained popularity in part because of their non-linear operation's …
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to
retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic …
retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic …
[PDF][PDF] Side Channel Attacks on IoT Applications
Y Yan, Y Yan - Conference on Embedded Wireless …, 2013 - research-information.bris.ac.uk
Abstract The Internet of Things (IoT) has become a reality: small connected devices feature
in everyday objects including childrens' toys, TVs, fridges, heating control units, etc. Supply …
in everyday objects including childrens' toys, TVs, fridges, heating control units, etc. Supply …
Microarchitectural Side-Channel Attacks
JF Gallais - 2013 - orbilu.uni.lu
[en] Cryptanalysis is the science which evaluates the security of a cryptosystem and detects
its weaknesses and flaws. Initially confined to the black-box model, where only the input and …
its weaknesses and flaws. Initially confined to the black-box model, where only the input and …