Attacking embedded ECC implementations through cmov side channels

E Nascimento, Ł Chmielewski, D Oswald… - … Conference on Selected …, 2016 - Springer
Side-channel attacks against implementations of elliptic-curve cryptography have been
extensively studied in the literature and a large tool-set of countermeasures is available to …

Online template attacks

L Batina, Ł Chmielewski, L Papachristodoulou… - Journal of Cryptographic …, 2019 - Springer
Template attacks are a special kind of side-channel attacks that work in two stages. In a first
stage, the attacker builds up a database of template traces collected from a device which is …

SIKE channels: Zero-value side-channel attacks on SIKE

L De Feo, N El Mrabet, A Genêt… - IACR Transactions on …, 2022 - cea.hal.science
We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST
PQC competition. Previous works had shown that SIKE is vulnerable to differential power …

EM analysis in the IoT context: Lessons learned from an attack on thread

D Dinu, I Kizhvatov - IACR Transactions on Cryptographic Hardware …, 2018 - tches.iacr.org
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread Page 1 EM Analysis
in the IoT Context: Lessons Learned from an Attack on Thread ∗ Daniel Dinu1 and Ilya …

Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4

A Genêt, NL de Guertechin, N Kaluđerović - Constructive Side-Channel …, 2021 - Springer
This paper describes the first practical single-trace side-channel power analysis of SIKE.
While SIKE is a post-quantum key exchange, the scheme still relies on a secret elliptic curve …

Certified side channels

CP García, S Ul Hassan, N Tuveri, I Gridin… - 29th USENIX Security …, 2020 - usenix.org
We demonstrate that the format in which private keys are persisted impacts Side Channel
Analysis (SCA) security. Surveying several widely deployed software libraries, we …

Systematic side-channel analysis of curve25519 with machine learning

L Weissbart, Ł Chmielewski, S Picek… - Journal of Hardware and …, 2020 - Springer
Profiling attacks, especially those based on machine learning, proved to be very successful
techniques in recent years when considering the side-channel analysis of symmetric-key …

Side-channel analysis of SM2: A late-stage featurization case study

N Tuveri, S Hassan, CP García… - Proceedings of the 34th …, 2018 - dl.acm.org
SM2 is a public key cryptography suite originating from Chinese standards, including digital
signatures and public key encryption. Ahead of schedule, code for this functionality was …

[PDF][PDF] Nonce@ Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms

A Monjur, B Yilmaz, F Werner, N Samwel… - … Symposium on Security …, 2021 - par.nsf.gov
We present the first side-channel attack on fullfledged smartphones that recovers the elliptic
curve secret scalar from the electromagnetic signal that corresponds to a single scalar-by …

A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks

R Poussier, Y Zhou, FX Standaert - Cryptographic Hardware and …, 2017 - Springer
The wide number and variety of side-channel attacks against scalar multiplication algorithms
makes their security evaluations complex, in particular in case of time constraints making …