Welcome to the resource topic for 2009/528
Title:
New Fault Attack on Elliptic Curve Scalar Multiplication
Authors: Alexey Chilikov, Oleg Taraskin
Abstract:In this report we present a new fault attack that applies to some implementations of elliptic curve scalar multiplication (ECSM). We consider the fault model with ‘precise control of time’, ‘loose control of fault location’ and ‘random number of faulty bits’. We show that in this fault model the secret key can be revealed with polynomial time complexity and linear number of faults. In addition, we discuss different countermeasures to resist this attack.
ePrint: https://eprint.iacr.org/2009/528
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .