A systematic appraisal of side channel evaluation strategies

M Azouaoui, D Bellizia, I Buhan, N Debande… - … Conference, SSR 2020 …, 2020 - Springer
In this paper we examine the central question that is how well do side channel evaluation
regimes capture the true security level of a product. Concretely, answering this question …

Efficient and secure ECDSA algorithm and its applications: A survey

M Al-Zubaidie, Z Zhang, J Zhang - arXiv preprint arXiv:1902.10313, 2019 - arxiv.org
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic
curve digital signature algorithm (ECDSA) have been attracting attention from many …

One trace is all it takes: Machine learning-based side-channel attack on eddsa

L Weissbart, S Picek, L Batina - … 2019, Gandhinagar, India, December 3–7 …, 2019 - Springer
Profiling attacks, especially those based on machine learning proved as very successful
techniques in recent years when considering side-channel analysis of block ciphers …

Deep learning mitigates but does not annihilate the need of aligned traces and a generalized resnet model for side-channel attacks

Y Zhou, FX Standaert - Journal of Cryptographic Engineering, 2020 - Springer
We consider the question whether synchronization/alignment methods are still
useful/necessary in the context of side-channel attacks exploiting deep learning algorithms …

Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4

A Genêt, NL de Guertechin, N Kaluđerović - Constructive Side-Channel …, 2021 - Springer
This paper describes the first practical single-trace side-channel power analysis of SIKE.
While SIKE is a post-quantum key exchange, the scheme still relies on a secret elliptic curve …

Systematic side-channel analysis of curve25519 with machine learning

L Weissbart, Ł Chmielewski, S Picek… - Journal of Hardware and …, 2020 - Springer
Profiling attacks, especially those based on machine learning, proved to be very successful
techniques in recent years when considering the side-channel analysis of symmetric-key …

Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of cortex-M4 SIKE

A Genêt, N Kaluđerović - … on Constructive Side-Channel Analysis and …, 2022 - Springer
In this paper, the recommended implementation of the post-quantum key exchange SIKE for
Cortex-M4 is attacked through power analysis with a single trace by clustering with the k …

SCA-secure ECC in software–mission impossible?

L Batina, Ł Chmielewski, B Haase, N Samwel… - Cryptology ePrint …, 2021 - eprint.iacr.org
This paper describes an ECC implementation computing the X25519 keyexchange protocol
on the Arm Cortex-M4 microcontroller. For providing protections against various side …

Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection

P Sasdrich, T Güneysu - Journal of Hardware and Systems Security, 2018 - Springer
Recent revelations on manipulations and back-doors in modern ECC have initiated the
revision of existing schemes and led to the selection of two new solutions for next …

On the worst-case side-channel security of ECC point randomization in embedded devices

M Azouaoui, F Durvaux, R Poussier… - Progress in Cryptology …, 2020 - Springer
Point randomization is an important countermeasure to protect Elliptic Curve Cryptography
(ECC) implementations against side-channel attacks. In this paper, we revisit its worst-case …