Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
From MaRDI portal
Publication:2145305
DOI10.1007/978-3-030-89915-8_11zbMath1491.94050OpenAlexW3209902965MaRDI QIDQ2145305
Novak Kaluđerović, Natacha Linard de Guertechin, Aymeric Genêt
Publication date: 17 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-89915-8_11
side-channel analysiscorrelation power analysisisogeny-based cryptographySIKEpost-quantum key exchangesingle-trace attack
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Quantum cryptography (quantum-theoretic aspects) (81P94)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Faster isogeny-based compressed key agreement
- Assessing the feasibility of single trace power analysis of Frodo
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Online Template Attacks
- On the Security of Supersingular Isogeny Cryptosystems
- Horizontal Correlation Analysis on Exponentiation
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Secure integration of asymmetric and symmetric encryption schemes
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
- The Argument Against Quantum Computers
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- Arithmetic Considerations for Isogeny-Based Cryptography
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Constructing elliptic curve isogenies in quantum subexponential time
- Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder
This page was built for publication: Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4