Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS

Side-Channel Aware Engineering

Deliverables

Publications

Set It and Forget It! Turnkey ECC for Instant Integration

Author(s): Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov
Published in: Annual Computer Security Applications Conference, 2020, Page(s) 760-771, ISBN 9781450388580
Publisher: ACM
DOI: 10.1145/3427228.3427291

Size, Speed, and Security: An Ed25519 Case Study

Author(s): Cesar Pereida García, Sampo Sovio
Published in: Secure IT Systems - 26th Nordic Conference, NordSec 2021, Issue LNCS 13115, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-91625-1_2

Attestation Waves: Platform Trust via Remote Power Analysis

Author(s): Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, Antonis Michalas
Published in: Cryptology and Network Security - 20th International Conference, CANS 2021, Issue LNCS 13099, 2021, ISBN 978-3-030-92547-5
Publisher: Springer
DOI: 10.1007/978-3-030-92548-2_24

Déjà Vu: Side-Channel Analysis of Mozilla's NSS

Author(s): Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley
Published in: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, Page(s) 1887-1902, ISBN 9781450370899
Publisher: ACM
DOI: 10.1145/3372297.3421761

Start Your ENGINEs: Dynamically Loadable Contemporary Crypto

Author(s): Nicola Tuveri, Billy Bob Brumley
Published in: 2019 IEEE Cybersecurity Development (SecDev), 2019, Page(s) 4-19, ISBN 978-1-5386-7289-1
Publisher: IEEE
DOI: 10.1109/secdev.2019.00014

Port Contention for Fun and Profit

Author(s): Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garcia, Nicola Tuveri
Published in: 2019 IEEE Symposium on Security and Privacy (SP), 2019, Page(s) 870-887, ISBN 978-1-5386-6660-9
Publisher: IEEE
DOI: 10.1109/sp.2019.00066

Certified Side Channels

Author(s): Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Bob Brumley
Published in: Proceedings of the 29th USENIX Security Symposium, 2020
Publisher: USENIX Association

A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks

Author(s): Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
Published in: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Issue LNCS 13090, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-92062-3_5

Fully Projective Radical Isogenies in Constant-Time

Author(s): Jesús-Javier Chi-Domínguez, Krijn Reijnders
Published in: Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings, Issue LNCS 13161, 2022
Publisher: Springer
DOI: 10.1007/978-3-030-95312-6_4

SoK: Remote Power Analysis

Author(s): Macarena C. Martínez-Rodríguez; Ignacio M. Delgado-Lozano; Billy Bob Brumley
Published in: ARES 2021: The 16th International Conference on Availability, Reliability and Security, 2021
Publisher: ACM
DOI: 10.1145/3465481.3465773

Implementation of RSA Signatures on GPU and CPU Architectures

Author(s): Eduardo Ochoa-Jiménez, Luis Rivera-Zamarripa, Nareli Cruz Cortés, Francisco Rodríguez-Henríquez
Published in: IEEE Access, Issue 8, 2020, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2963826

Extending the GLS endomorphism to speed up GHS Weil descent using Magma

Author(s): Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
Published in: Finite Fields Their Appl., Issue 75, 2021, ISSN 1071-5797
Publisher: Academic Press
DOI: 10.1016/j.ffa.2021.101891

Optimal strategies for CSIDH

Author(s): Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
Published in: Advances in Mathematics of Communications, Issue 16:2, 2022, ISSN 1930-5346
Publisher: American Institute of Mathematical Sciences
DOI: 10.3934/amc.2020116

Projection of Dual-Rail DPA Countermeasures in Future FinFET and Emerging TFET Technologies

Author(s): Ignacio M. Delgado-Lozano, Erica Tena-Sánchez, Juan Núñez, Antonio J. Acosta
Published in: ACM J. Emerg. Technol. Comput. Syst., Issue 16:3, 2020, ISSN 1550-4832
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3381857

Design and Analysis of Secure Emerging Crypto-Hardware Using HyperFET Devices

Author(s): Ignacio M. Delgado-Lozano, Erica Tena-Sánchez, Juan Núñez, Antonio J. Acosta
Published in: IEEE Trans. Emerg. Top. Comput., Issue 9:2, 2021, ISSN 2168-6750
Publisher: IEEE Computer Society
DOI: 10.1109/tetc.2020.2977735

When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA

Author(s): Alejandro Cabrera Aldaya, Billy Bob Brumley
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2020:2, 2020, Page(s) 196-221, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2020.i2.196-221

From A to Z: Projective coordinates leakage in the wild

Author(s): Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2020:3, 2020, Page(s) 428-453, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2020.i3.428-453

Memory Tampering Attack on Binary GCD Based Inversion Algorithms

Author(s): Alejandro Cabrera Aldaya, Billy Bob Brumley, Alejandro J. Cabrera Sarmiento, Santiago Sánchez-Solano
Published in: International Journal of Parallel Programming, Issue 47/4, 2019, Page(s) 621-640, ISSN 0885-7458
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10766-018-0610-x

Cache-Timing Attacks on RSA Key Generation

Author(s): Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2019:4, 2019, Page(s) 213-242, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2019.i4.213-242

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents

Author(s): Jorge Chávez-Saab; Jesús-Javier Chi-Domínguez; Samuel Jaques; Francisco Rodríguez-Henríquez
Published in: Journal of Cryptographic Engineering, 2021, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-021-00271-w

Online Template Attacks: Revisited

Author(s): Alejandro Cabrera Aldaya; Billy Bob Brumley
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2021:3, 2021, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.46586/tches.v2021.i3.28-59

Batch Binary Weierstrass

Author(s): Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
Published in: Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings, Issue 11774, 2019, Page(s) 364-384, ISBN 978-3-030-30529-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-30530-7_18

Triggerflow: Regression Testing by Advanced Execution Path Inspection

Author(s): Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Issue 11543, 2019, Page(s) 330-350, ISBN 978-3-030-22037-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-22038-9_16

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available