SCA Strikes Back: Cracking Elliptic Curve Crypto with Bit-Level Leaks
New research reveals that even randomized elliptic curve implementations are vulnerable to single-trace side-channel attacks exploiting data and address leakage in field operations.



