This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== A formula for disaster: a unified approach to elliptic curve special-point-based attacks [ASIACRYPT 2021] ====== ~~NOTOC~~ <grid> <col xs="12" sm="8" lg="8"> <TEXT size="large"> \_{{fa>user}}\_\_//Authors:// [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], Jesús-Javier Chi-Domínguez, [[:publications:authors:jan-jancar|Jan Jancar]] and Billy Bob Brumley {{fa>user-circle-o}}\_//Primary contact:// Jan Jancar %%<%%<j08ny@mail.muni.cz>%%>%% {{fa>bullhorn}}\_//Conference:// [[https://asiacrypt.iacr.org/2021///|ASIACRYPT 2021]] </TEXT> </col> <col xs="12" sm="4" lg="4"> <TEXT align="right"> <button type="warning" icon="fa fa-fw fa-file-pdf-o">[[https://crocs.fi.muni.cz/_media/publications/pdf/2021-asiacrypt-formulas.pdf|PRE-PRINT PDF]]</button> \_ <button icon="fa fa-file-image-o">[[https://crocs.fi.muni.cz/_media/public/papers/asiacrypt2021_formula_presentation.pdf |Presentation]]</button> \_ <button collapse="bibtex" icon="fa fa-fw fa-file-code-o">BiBTeX</button> </TEXT> </col> </grid> <collapse id="bibtex" collapsed="true"> @InProceedings{2021-asiacrypt-formulas, Title = {A formula for disaster: a unified approach to elliptic curve special-point-based attacks}, Author = {Vladimir Sedlacek and Jesús-Javier Chi-Domínguez and Jan Jancar and Billy Bob Brumley}, BookTitle = {Advances in Cryptology – ASIACRYPT 2021}, Publisher = {Springer}, Year = {2021}, ISBN = {978-3-030-64837-4}, Keywords = {ECC, cryptoimplementations, libraries, side-channel}, crocsweb = {https://crocs.fi.muni.cz/papers/formulas_asiacrypt21}, } </collapse> <panel type="default" title="Abstract"> The Refined Power Analysis, Zero-Value Point, and Exceptional Procedure attacks introduced side-channel attack techniques against specific cases of elliptic curve cryptography. The three attacks recover bits of a static ECDH key adaptively, collecting information on whether a certain multiple of the input point was computed. We unify and generalize these attacks in a common framework, and solve the corresponding problem for a broader class of inputs. We also introduce a version of the attack against windowed scalar multiplication methods, recovering the full scalar instead of just a part of it. Finally, we systematically analyze elliptic curve point addition formulas from the Explicit-Formulas Database, classify all non-trivial exceptional points, and find them in new formulas. These results indicate the usefulness of our tooling for unrolling formulas and finding special points which we released publicly, potentially of independent research interest. </panel> ===== Summarizing video ===== [[https://www.youtube.com/watch?v=RJY0A2IPVLE|IACR YouTube video]] ===== Research artifacts (supplementary material) ===== <button type="primary" icon="fa fa-fw fa-database">[[https://github.com/crocs-muni/formula-for-disaster|Go to artifacts repository (github)]]</button>