## Sign Change Fault Attacks on Elliptic Curve Cryptosystems (2004)

### Cached

### Download Links

- [eprint.iacr.org]
- [eprint.iacr.org]
- [www.upb.de]
- DBLP

### Other Repositories/Bibliography

Venue: | Fault Diagnosis and Tolerance in Cryptography 2006 (FDTC ’06), volume 4236 of Lecture Notes in Computer Science |

Citations: | 14 - 0 self |

### BibTeX

@INPROCEEDINGS{Blömer04signchange,

author = {Johannes Blömer and Martin Otto and Jean-Pierre Seifert},

title = {Sign Change Fault Attacks on Elliptic Curve Cryptosystems},

booktitle = {Fault Diagnosis and Tolerance in Cryptography 2006 (FDTC ’06), volume 4236 of Lecture Notes in Computer Science},

year = {2004},

pages = {36--52},

publisher = {Prentice Hall}

}

### OpenURL

### Abstract

We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit di#erent number representations as they are often employed in modern cryptographic applications. Previously, fault attacks on elliptic curves aimed to force a device to output points which are on a cryptographically weak curve. Such attacks can easily be defended against. Our attack produces points which do not leave the curve and are not easily detected. The paper also presents a revised scalar multiplication algorithm that provably protects against Sign Change Attacks.