SIKE Channels

  • De Feo L
  • El Mrabet N
  • Genêt A
  • et al.
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure. We show that coordinate randomization alone is not sufficient, because SIKE is vulnerable to a class of attacks similar to refined power analysis in elliptic curve cryptography, named zero-value attacks. We describe and confirm in the lab two such attacks leading to full key recovery, and analyze their countermeasures.

Cite

CITATION STYLE

APA

De Feo, L., El Mrabet, N., Genêt, A., Kaluđerovi´c, N., Linard de Guertechin, N., Pontié, S., & Tasso, É. (2022). SIKE Channels. IACR Transactions on Cryptographic Hardware and Embedded Systems, 264–289. https://doi.org/10.46586/tches.v2022.i3.264-289

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free