Cargando…
Online Template Attack on ECDSA:: Extracting Keys via the Other Side
We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same...
Autores principales: | Roelofs, Niels, Samwel, Niels, Batina, Lejla, Daemen, Joan |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334982/ http://dx.doi.org/10.1007/978-3-030-51938-4_16 |
Ejemplares similares
-
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
por: De Micheli, Gabrielle, et al.
Publicado: (2020) -
Client-side attacks and defense
por: Shimonski, Robert, et al.
Publicado: (2012) -
When Similarities Among Devices are Taken for Granted: Another Look at Portability
por: Rioja, Unai, et al.
Publicado: (2020) -
Keys to the kingdom: impressioning, privilege escalation, bumping, and other key-based attacks against physical locks
por: Ollam, Deviant
Publicado: (2012) -
Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation
por: Chang, Yajing, et al.
Publicado: (2022)