An updated survey on secure ECC implementations: attacks, countermeasures and cost

  • Authors:
  • Junfeng Fan;Ingrid Verbauwhede

  • Affiliations:
  • ESAT/SCD-COSIC and IBBT, Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium;ESAT/SCD-COSIC and IBBT, Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium

  • Venue:
  • Cryptography and Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Unprotected implementations of cryptographic primitives are vulnerable to physical attacks. While the adversary only needs to succeed in one out of many attack methods, the designers have to consider all the known attacks, whenever applicable to their system, simultaneously. Thus, keeping an organized, complete and up-to-date table of physical attacks and countermeasures is of paramount importance to system designers. This paper summarises known physical attacks and countermeasures on Elliptic Curve Cryptosystems. For implementers of elliptic curve cryptography, this paper can be used as a road map for countermeasure selection in the early design stages.