Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P
暂无分享,去创建一个
Yasuyuki Nogami | Takuya Kusaka | Sylvain Duquesne | Yoshinori Uetake | Akihiro Sanada | Leo Weissbart | Y. Nogami | S. Duquesne | Takuya Kusaka | Léo Weissbart | Yoshinori Uetake | Akihiro Sanada
[1] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[4] Peter Schwabe,et al. High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers , 2015, Des. Codes Cryptogr..
[5] Eric Peeters,et al. Advanced DPA Theory and Practice , 2013 .
[6] Yuval Yarom,et al. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 , 2017, CCS.
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[9] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.