Implementation Attacks on Exponentiation Algorithms
Implementations of the Discrete Logarithm Based Cryptography are vulnerable on many side-channel and fault attacks. In this session, two new approaches for such attacks are presented.
Topic 1: Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Authors: Neil Hanley, HeeSeok Kim, Michael Tunstall
Topic 2: Cold Boot Attacks in the Discrete Logarithm Setting
Authors: Dale Sibborn, Bertram Poettering