Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Side-Channel Aware Engineering

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

Set It and Forget It! Turnkey ECC for Instant Integration (opens in new window)

Author(s): Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov
Published in: Annual Computer Security Applications Conference, 2020, Page(s) 760-771, ISBN 9781450388580
Publisher: ACM
DOI: 10.1145/3427228.3427291

Size, Speed, and Security: An Ed25519 Case Study (opens in new window)

Author(s): Cesar Pereida García, Sampo Sovio
Published in: Secure IT Systems - 26th Nordic Conference, NordSec 2021, Issue LNCS 13115, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-91625-1_2

Attestation Waves: Platform Trust via Remote Power Analysis (opens in new window)

Author(s): Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, Antonis Michalas
Published in: Cryptology and Network Security - 20th International Conference, CANS 2021, Issue LNCS 13099, 2021, ISBN 978-3-030-92547-5
Publisher: Springer
DOI: 10.1007/978-3-030-92548-2_24

Déjà Vu: Side-Channel Analysis of Mozilla's NSS (opens in new window)

Author(s): Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley
Published in: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, Page(s) 1887-1902, ISBN 9781450370899
Publisher: ACM
DOI: 10.1145/3372297.3421761

Start Your ENGINEs: Dynamically Loadable Contemporary Crypto (opens in new window)

Author(s): Nicola Tuveri, Billy Bob Brumley
Published in: 2019 IEEE Cybersecurity Development (SecDev), 2019, Page(s) 4-19, ISBN 978-1-5386-7289-1
Publisher: IEEE
DOI: 10.1109/secdev.2019.00014

Port Contention for Fun and Profit (opens in new window)

Author(s): Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garcia, Nicola Tuveri
Published in: 2019 IEEE Symposium on Security and Privacy (SP), 2019, Page(s) 870-887, ISBN 978-1-5386-6660-9
Publisher: IEEE
DOI: 10.1109/sp.2019.00066

Certified Side Channels

Author(s): Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Bob Brumley
Published in: Proceedings of the 29th USENIX Security Symposium, 2020
Publisher: USENIX Association

A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks (opens in new window)

Author(s): Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
Published in: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Issue LNCS 13090, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-92062-3_5

Fully Projective Radical Isogenies in Constant-Time (opens in new window)

Author(s): Jesús-Javier Chi-Domínguez, Krijn Reijnders
Published in: Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings, Issue LNCS 13161, 2022
Publisher: Springer
DOI: 10.1007/978-3-030-95312-6_4

SoK: Remote Power Analysis (opens in new window)

Author(s): Macarena C. Martínez-Rodríguez; Ignacio M. Delgado-Lozano; Billy Bob Brumley
Published in: ARES 2021: The 16th International Conference on Availability, Reliability and Security, 2021
Publisher: ACM
DOI: 10.1145/3465481.3465773

Implementation of RSA Signatures on GPU and CPU Architectures (opens in new window)

Author(s): Eduardo Ochoa-Jiménez, Luis Rivera-Zamarripa, Nareli Cruz Cortés, Francisco Rodríguez-Henríquez
Published in: IEEE Access, Issue 8, 2020, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2963826

Extending the GLS endomorphism to speed up GHS Weil descent using Magma (opens in new window)

Author(s): Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
Published in: Finite Fields Their Appl., Issue 75, 2021, ISSN 1071-5797
Publisher: Academic Press
DOI: 10.1016/j.ffa.2021.101891

Optimal strategies for CSIDH (opens in new window)

Author(s): Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
Published in: Advances in Mathematics of Communications, Issue 16:2, 2022, ISSN 1930-5346
Publisher: American Institute of Mathematical Sciences
DOI: 10.3934/amc.2020116

Projection of Dual-Rail DPA Countermeasures in Future FinFET and Emerging TFET Technologies (opens in new window)

Author(s): Ignacio M. Delgado-Lozano, Erica Tena-Sánchez, Juan Núñez, Antonio J. Acosta
Published in: ACM J. Emerg. Technol. Comput. Syst., Issue 16:3, 2020, ISSN 1550-4832
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3381857

Design and Analysis of Secure Emerging Crypto-Hardware Using HyperFET Devices (opens in new window)

Author(s): Ignacio M. Delgado-Lozano, Erica Tena-Sánchez, Juan Núñez, Antonio J. Acosta
Published in: IEEE Trans. Emerg. Top. Comput., Issue 9:2, 2021, ISSN 2168-6750
Publisher: IEEE Computer Society
DOI: 10.1109/tetc.2020.2977735

When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA (opens in new window)

Author(s): Alejandro Cabrera Aldaya, Billy Bob Brumley
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2020:2, 2020, Page(s) 196-221, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2020.i2.196-221

From A to Z: Projective coordinates leakage in the wild (opens in new window)

Author(s): Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2020:3, 2020, Page(s) 428-453, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2020.i3.428-453

Memory Tampering Attack on Binary GCD Based Inversion Algorithms (opens in new window)

Author(s): Alejandro Cabrera Aldaya, Billy Bob Brumley, Alejandro J. Cabrera Sarmiento, Santiago Sánchez-Solano
Published in: International Journal of Parallel Programming, Issue 47/4, 2019, Page(s) 621-640, ISSN 0885-7458
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10766-018-0610-x

Cache-Timing Attacks on RSA Key Generation (opens in new window)

Author(s): Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2019:4, 2019, Page(s) 213-242, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2019.i4.213-242

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents (opens in new window)

Author(s): Jorge Chávez-Saab; Jesús-Javier Chi-Domínguez; Samuel Jaques; Francisco Rodríguez-Henríquez
Published in: Journal of Cryptographic Engineering, 2021, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-021-00271-w

Online Template Attacks: Revisited (opens in new window)

Author(s): Alejandro Cabrera Aldaya; Billy Bob Brumley
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2021:3, 2021, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.46586/tches.v2021.i3.28-59

Batch Binary Weierstrass (opens in new window)

Author(s): Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
Published in: Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings, Issue 11774, 2019, Page(s) 364-384, ISBN 978-3-030-30529-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-30530-7_18

Triggerflow: Regression Testing by Advanced Execution Path Inspection (opens in new window)

Author(s): Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Issue 11543, 2019, Page(s) 330-350, ISBN 978-3-030-22037-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-22038-9_16

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0