2018
DOI: 10.3390/app8102002
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure

Abstract: Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal collision correlation analysis, have been successfully applied to elliptic curve methods to investigate their resistance to side-channel attacks. These attacks turn out to be very powerful since they only require leakage of a single power consumption trace. In th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(18 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…As a result, the version 2 is used for the hardware implementations in [10], [21]- [23]. Recently, the work in [25] has evaluated version 2 from the security point of view and pointed out some new vulnerabilities (attack methods) on BHC. Moreover, in order to provide the security against the highlighted attack methods, the authors in [25] have constructed new formulations for the unified PA law of BHC.…”
Section: B Research Gapmentioning
confidence: 99%
See 2 more Smart Citations
“…As a result, the version 2 is used for the hardware implementations in [10], [21]- [23]. Recently, the work in [25] has evaluated version 2 from the security point of view and pointed out some new vulnerabilities (attack methods) on BHC. Moreover, in order to provide the security against the highlighted attack methods, the authors in [25] have constructed new formulations for the unified PA law of BHC.…”
Section: B Research Gapmentioning
confidence: 99%
“…Recently, the work in [25] has evaluated version 2 from the security point of view and pointed out some new vulnerabilities (attack methods) on BHC. Moreover, in order to provide the security against the highlighted attack methods, the authors in [25] have constructed new formulations for the unified PA law of BHC. The new formulations for unified BHC law in [25] are termed as version 3 in this article.…”
Section: B Research Gapmentioning
confidence: 99%
See 1 more Smart Citation
“…Thereafter, practical results of an improved HCCA exploiting collisions of multiple LIMs in scalar multiplication targeting a 384-bit implementation on a 64-bit architecture is published by Danger et al [17]. Practical experimental results of HCCA and ROSETTA on specific elliptic curves are presented in the works of Das et al [18] and Cho et al [19] targeting 192-bit and 256-bit implementations, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…The thirteen papers in this special issue can be classified into the following four research themes:Power analysis attacks and counter-measures: This special issue contains various power analysis attacks and counter-measures on well-known crypto algorithms: Elliptic curve cryptosystems (ECCs), the block cipher SEED, and the post-quantum cryptographies (PQCs). A new side channel leakage of the SEED in financial IC cards in the Republic of Korea was detected in [61]; and new vulnerabilities, using a single power consumption trace obtained in the elliptic curve scalar multiplication algorithm, were established in [62,63]. Recently, PQCs, cryptographic algorithms executed on a classical computer which are expected to be secure against adversaries with quantum computers, have been actively studied.…”
mentioning
confidence: 99%