Proceedings of the 2011 International Conference on Electrical Engineering and Informatics 2011
DOI: 10.1109/iceei.2011.6021757
|View full text |Cite
|
Sign up to set email alerts
|

Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Corresponding to their classification horizontal attacks are single-trace attacks, for example SPA or HCA attacks. Practical examples of horizontal attacks against asymmetric cryptographic approaches such RSA or ECC are the SPA described in [7], simple electromagnetic analysis (SEMA) attacks e.g. [8], the Big Mac attack [9], the localized EMA attack [10], horizontal collision correlation analysis (HCCA) attacks [11]- [12] , horizontal DPA and DEMA attacks [13], [14].…”
Section: Background: Verical and Horizontal Attacksmentioning
confidence: 99%
“…Corresponding to their classification horizontal attacks are single-trace attacks, for example SPA or HCA attacks. Practical examples of horizontal attacks against asymmetric cryptographic approaches such RSA or ECC are the SPA described in [7], simple electromagnetic analysis (SEMA) attacks e.g. [8], the Big Mac attack [9], the localized EMA attack [10], horizontal collision correlation analysis (HCCA) attacks [11]- [12] , horizontal DPA and DEMA attacks [13], [14].…”
Section: Background: Verical and Horizontal Attacksmentioning
confidence: 99%
“…ECC has speed and security advantages over RSA and Diffie-Hellman [18].It is a replacement for problems found in other public key algorithms like discrete log used in DSA and integer factorization in RSA. The security level of 1024 bits key size of RSA can be achieved by 160 bits of ECC [12]. Computationally also it is much faster and thus suitable for devices with limited computation capability like mobile devices [3].…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%
“…One such risk is side‐channel attack. Side‐channel attack refers to the exploitation of side‐channel leakage information, including, power consumption, electromagnetic emanations, cache‐timing, acoustic vibrations, to recover the secret information processed inside edge device 7‐9 . These leakages are obtained from the edge device while it is processing the sensitive information using a secure algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Side-channel attack refers to the exploitation of side-channel leakage information, including, power consumption, electromagnetic emanations, cache-timing, acoustic vibrations, to recover the secret information processed inside edge device. [7][8][9] These leakages are obtained from the edge device while it is processing the sensitive information using a secure algorithm. There exist various secure cryptographic algorithms, however, elliptic curve cryptographic (ECC) based asymmetric algorithms are preferred for authentication and digital security in the resource-constraint environments due to the efficient processing, and small key size.…”
mentioning
confidence: 99%