Horizontal Correlation Analysis on Exponentiation
From MaRDI portal
Publication:3063954
DOI10.1007/978-3-642-17650-0_5zbMath1295.94040OpenAlexW2127059139MaRDI QIDQ3063954
Georges Gagnerot, Christophe Clavier, Benoit Feix, Vincent Verneuil, Mylène Roussellet
Publication date: 17 December 2010
Published in: Information and Communications Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17650-0_5
Related Items (23)
Key Bit-Dependent Attack on Protected PKC Using a Single Trace ⋮ Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks ⋮ Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 ⋮ On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS ⋮ Secure GCM implementation on AVR ⋮ High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers ⋮ The distributions of individual bits in the output of multiplicative operations ⋮ Horizontal collision correlation attack on elliptic curves ⋮ Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks ⋮ T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks ⋮ Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures ⋮ Combined fault and leakage resilience: composability, constructions and compiler ⋮ A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation ⋮ Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace ⋮ On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance ⋮ Improving the Big Mac Attack on Elliptic Curve Cryptography ⋮ Thwarting side-channel analysis against RSA cryptosystems with additive blinding
This page was built for publication: Horizontal Correlation Analysis on Exponentiation