2018
DOI: 10.1007/978-3-319-75208-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(34 citation statements)
references
References 32 publications
0
34
0
Order By: Relevance
“…In the more general unsupervised setting (see e.g. [8][9][10][11][12]17]), the access to a training device is not possible. The attacker acquires as many traces as possible and induces a maximal value for b that can be handled through the attack.…”
Section: Overall Attack Processmentioning
confidence: 99%
“…In the more general unsupervised setting (see e.g. [8][9][10][11][12]17]), the access to a training device is not possible. The attacker acquires as many traces as possible and induces a maximal value for b that can be handled through the attack.…”
Section: Overall Attack Processmentioning
confidence: 99%
“…The traces used to analyze this implementation are obtained from a publicly available dataset [11]. All details on this implementation, including the additional countermeasures, are described in [27].…”
Section: Elliptic Curve Scalar Multiplicationmentioning
confidence: 99%
“…4 Furthermore, all these cut traces (5997 × 255 = 1, 529, 235) are aligned to exploit the leakage efficiently. Details about the implementation and how the traces are aligned are in [27]. Figure 3 represents the SNR of the dataset for the bit model.…”
Section: Protected Implementation Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Analyses with clustering methods [12][13][14] are researched. Recently, horizontal attacks [7] have been succeeding with clustering algorithms [15,16]. These attacks exploiting clustering algorithms and horizontal attacks have so far fixed the dimension (length) of the segment/subsignal of power trace as trace_length key_bits when treating segments.…”
mentioning
confidence: 99%