This repository contains auxiliary material for the paper "Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks" which was accepted to FDTC 2020.
- Fabio Campos
- Matthias J. Kannwischer
- Michael Meyer
- Hiroshi Onuki
- Marc Stöttinger
The paper is available at https://eprint.iacr.org/2020/1005.pdf
git clone --recurse-submodules https://github.com/csidhfi/csidhfi
This archive contains the following
simulationcontains the simulation scripts used in Section 4 of the paper. If you have Python3 installed, then these should allow you to reproduce the results in the paper. For more details see simulation/README.md
attackcontains the attack scripts used in Section 5 of the paper. If you have a ChipWhisperer-Lite (CW1173) 32-bit basic board which features a STM32F303 (and a little bit of time), you can reproduce the results presented in the paper by simply running our attack script.
For more details see attack/README.md
benchmarkcontains our implementation with and without countermeasures together with a benchmarking framework which allows to reproduce the results of Section 7 of the paper. In addition to the STM32F303, it also supports the popular STM32F407.
For more details see benchmark/README.md
Code in this repository that does not indicate otherwise is placed in the public domain.
For the third party code see their licenses: