2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC) 2010
DOI: 10.1109/aspdac.2010.5419848
|View full text |Cite
|
Sign up to set email alerts
|

Scan-based attack against elliptic curve cryptosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Public-key ciphers have also been proven to be susceptible to scan attacks. Binary exponentiation is the target for the RSA scan-attack described in [8], while the Montgomery multiplication method is targeted for the ECC attack [9]. Both attack methods are based on observing the values of the intermediate register of interest using the scan chain.…”
Section: Emerging Topics In Computingmentioning
confidence: 99%
“…Public-key ciphers have also been proven to be susceptible to scan attacks. Binary exponentiation is the target for the RSA scan-attack described in [8], while the Montgomery multiplication method is targeted for the ECC attack [9]. Both attack methods are based on observing the values of the intermediate register of interest using the scan chain.…”
Section: Emerging Topics In Computingmentioning
confidence: 99%