作者
Junfeng Fan, Xu Guo, Elke De Mulder, Patrick Schaumont, Bart Preneel, Ingrid Verbauwhede
发表日期
2010/6/13
研讨会论文
2010 IEEE international symposium on hardware-oriented security and trust (HOST)
页码范围
76-87
出版商
IEEE
简介
Implementations of cryptographic primitives are vulnerable to physical attacks. While the adversary only needs to succeed in one out of many attack methods, the designers have to consider all the known attacks, whenever applicable to their system, simultaneously. Thus, keeping an organized, complete and up-to-date table of physical attacks and countermeasures is of paramount importance to system designers. This paper summarizes known physical attacks and countermeasures on Elliptic Curve Cryptosystems. Instead of repeating the details of different attacks, we focus on a systematic way of organizing and understanding known attacks and countermeasures. Three principles of selecting countermeasures to thwart multiple attacks are given. This paper can be used as a road map for countermeasure selection in a first design iteration.
引用总数
201120122013201420152016201720182019202020212022202320241391310161417142224241466
学术搜索中的文章
J Fan, X Guo, E De Mulder, P Schaumont, B Preneel… - 2010 IEEE international symposium on hardware …, 2010