SCA on Elliptic Curve

i have much better experience in the networking

Hi friends, some literature review on this topic which I found really helpful

“State of the art of secure ECC implementations:a survey of known side channel attacks and countermeasures” by Junfeng et al
“The Doubling Attack – Why Upwards Is Better than Downwards” by Foque et al
“Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems” by Coron et al

Thanks for sharing those links! I haven’t tried this yet and am interested too, so if you have a go at it let us know. Only so much time in each day :wink: