• Publications
  • Influence
A novel fault attack against ECDSA
A novel fault attack against ECDSA is proposed in this work. It allows to retrieve the secret signing key, by means of injecting faults during the computation of the signature primitive. The proposedExpand
  • 18
  • 1
Breaking Ed25519 in WolfSSL
Ed25519 is an instance of the Elliptic Curve based signature scheme EdDSA that was recently introduced to solve an inconvenience of the more established ECDSA. Namely, both schemes require theExpand
  • 16
  • 1
A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves
The field of elliptic curve cryptography has recently experienced a deployment of new models of elliptic curves, such as Montgomery or twisted Edwards. Computations on these curves have been provenExpand
  • 7
  • 1
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure
Elliptic curve cryptosystems proved to be well suited for securing systems with constrained resources like embedded and portable devices. In a fault-based attack, errors are induced during theExpand
  • 5
  • 1
New results for partial key exposure on RSA with exponent blinding
In 1998, Boneh, Durfee and Frankel introduced partial key exposure attacks, a novel application of Coppersmith's method, to retrieve an RSA private key given only a fraction of its bits. This type ofExpand
  • 1
Partial Key Exposure Attacks on RSA with Exponent Blinding
Partial key exposure attacks, introduced by Boneh, Durfee and Frankel in 1998, aim at retrieving an RSA private key when a fraction of its bits is known. These attacks are of particular interest inExpand
  • 1
On the Homomorphic Computation of Symmetric Cryptographic Primitives
We present an analysis on the homomorphic computability of different symmetric cryptographic primitives, with the goal of understanding their characteristics with respect to the homomorphicExpand
  • 10
Breaking Ed 25519 in WolfSSL
Ed25519 is an instance of the Elliptic Curve based signature scheme EdDSA that was recently introduced to solve an inconvenience of the more established ECDSA. Namely, both schemes require theExpand
  • 1
CASCA: A Design Automation Approach for Designing Hardware Countermeasures Against Side-Channel Attacks
Implementing a cryptographic circuit poses challenges not always acknowledged in the backing mathematical theory. One of them is the vulnerability against side-channel attacks. A side-channel attackExpand
Secure and Effective Implementation of an IOTA Light Node using STM32
A major challenge in networked sensor systems and other IoT environments is addressing security. Vulnerabilities in those systems arise from poor physical security, unauthenticated devices, insecureExpand