2021
DOI: 10.1007/978-3-030-85987-9_12
|View full text |Cite
|
Sign up to set email alerts
|

(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…One can modify memory locations and observe if this changes the resulting shared secret [11]. A different attack avenue is to target fault injections against dummy computations in CSIDH [10,28]. We emphasize that these are attacks against specific implementations and variants of CSIDH.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One can modify memory locations and observe if this changes the resulting shared secret [11]. A different attack avenue is to target fault injections against dummy computations in CSIDH [10,28]. We emphasize that these are attacks against specific implementations and variants of CSIDH.…”
Section: Related Workmentioning
confidence: 99%
“…Although these attacks are implementation-specific, the proposed countermeasures impact our attack too. Typically, real isogenies are computed prior to dummy isogenies, but the order of real and dummy isogenies can be randomized [10,28] with essentially no computational overhead. When applied to dummy-based implementations, e.g., from [30,32], this randomization means dummy isogenies can appear in different rounds for each run, which makes the definitions of the curves E r,± almost obsolete.…”
Section: Previous Fault Attacks and Countermeasuresmentioning
confidence: 99%