2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig) 2017
DOI: 10.1109/reconfig.2017.8279800
|View full text |Cite
|
Sign up to set email alerts
|

Horizontal address-bit DPA against montgomery kP implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2
1

Relationship

3
2

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 22 publications
0
18
0
Order By: Relevance
“…The modification done in Algorithm 2 in comparison to the Algorithm 1 refers to the initialization phase and the processing of k l−2 . The operation flow for processing k l−2 (see lines 2-8 in Algorithm 2) differs from the operation flow in the main loop (see lines [9][10][11][12][13][14][15][16][17]. The processing of key bit k l−2 consists of 5 multiplications, 5 squarings, 3 additions and 8 write to register operations, independent of the value of k l−2 .…”
Section: Our Implementation Of the Montgomery Kpmentioning
confidence: 99%
See 3 more Smart Citations
“…The modification done in Algorithm 2 in comparison to the Algorithm 1 refers to the initialization phase and the processing of k l−2 . The operation flow for processing k l−2 (see lines 2-8 in Algorithm 2) differs from the operation flow in the main loop (see lines [9][10][11][12][13][14][15][16][17]. The processing of key bit k l−2 consists of 5 multiplications, 5 squarings, 3 additions and 8 write to register operations, independent of the value of k l−2 .…”
Section: Our Implementation Of the Montgomery Kpmentioning
confidence: 99%
“…Since the use of registers in the Montgomery kP algorithm depends on the value of the processed bit k i of the scalar k, horizontal differential SCA attacks can be successful. Due to the nature of this SCA leakage -the addressing of the registers/blocks -this kind of attacks was denoted as horizontal bus and address bit DPA in [10]. Please note that in Fig.…”
Section: Our Implementation Of the Montgomery Kpmentioning
confidence: 99%
See 2 more Smart Citations
“…Practical examples of horizontal attacks against asymmetric cryptographic approaches such RSA or ECC are the SPA described in [7], simple electromagnetic analysis (SEMA) attacks e.g. [8], the Big Mac attack [9], the localized EMA attack [10], horizontal collision correlation analysis (HCCA) attacks [11]- [12] , horizontal DPA and DEMA attacks [13], [14]. Vertical attacks corresponding to the new classification are "more than one trace" attacks i.e.…”
Section: Background: Verical and Horizontal Attacksmentioning
confidence: 99%