A systematic appraisal of side channel evaluation strategies

M Azouaoui, D Bellizia, I Buhan, N Debande… - … Conference, SSR 2020 …, 2020 - Springer
In this paper we examine the central question that is how well do side channel evaluation
regimes capture the true security level of a product. Concretely, answering this question …

Attacking embedded ECC implementations through cmov side channels

E Nascimento, Ł Chmielewski, D Oswald… - … Conference on Selected …, 2016 - Springer
Side-channel attacks against implementations of elliptic-curve cryptography have been
extensively studied in the literature and a large tool-set of countermeasures is available to …

Simpler and more efficient rank estimation for side-channel security assessment

C Glowacz, V Grosso, R Poussier, J Schüth… - Fast Software Encryption …, 2015 - Springer
Rank estimation algorithms allow analyzing the computational security of cryptographic keys
for which adversaries have obtained partial information thanks to leakage or cryptanalysis …

Tighter, faster, simpler side-channel security evaluations beyond computing power

DJ Bernstein, T Lange, C van Vredendaal - 2015 - research.tue.nl
A Eurocrypt 2013 paper" Security evaluations beyond computing power: How to analyze
side-channel attacks you cannot mount?" by Veyrat-Charvillon, Gérard, and Standaert …

ASCA, SASCA and DPA with enumeration: which one beats the other and when?

V Grosso, FX Standaert - Advances in Cryptology–ASIACRYPT 2015: 21st …, 2015 - Springer
We describe three contributions regarding the Soft Analytical Side-Channel Attacks
(SASCA) introduced at Asiacrypt 2014. First, we compare them with Algebraic Side-Channel …

A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks

R Poussier, Y Zhou, FX Standaert - Cryptographic Hardware and …, 2017 - Springer
The wide number and variety of side-channel attacks against scalar multiplication algorithms
makes their security evaluations complex, in particular in case of time constraints making …

Mcrank: Monte carlo key rank estimation for side-channel security evaluations

G Camurati, M Dell'Amico… - IACR Transactions on …, 2023 - research-collection.ethz.ch
Key rank estimation provides a measure of the effort that the attacker has to spend
bruteforcing the key of a cryptographic algorithm, after having gained some information from …

Template Attacks against ECC: practical implementation against Curve25519

A Loiseau, M Lecomte… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
This paper introduces a new profiling attack that targets elliptic curves-based cryptographic
implementations. This attack exploits leakages from the conditional swap operation used in …

Recent developments in side-channel analysis on elliptic curve cryptography implementations

L Papachristodoulou, L Batina, N Mentens - Hardware Security and Trust …, 2017 - Springer
Recent Developments in Side-Channel Analysis on Elliptic Curve Cryptography Implementations
| SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …

[PDF][PDF] Key enumeration, rank estimation and horizontal side-channel attacks

R Poussier - 2017 - dial.uclouvain.be
Since their discovery in the late 90's, side-channel attacks have been shown to be a great
threat to the security of cryptographic implementations. In addition to the standard inputs and …