<div dir="ltr"><div>Apologies if this has been raised before.<br>Has anobody had time to read this paper already :<br><a href="http://eprint.iacr.org/2015/577">http://eprint.iacr.org/2015/577</a> <br></div>According to the authors the PointOnCurve check needs to be done even if the curve is twist-secure and they describe an attack if it was forgotten. <br><br>Here is the full abstract : <br>Several authors suggest that the use of twist secure
Elliptic Curves automatically leads to secure implementations. We
argue that even for twist secure
curves a point validation has to be performed.
We illustrate this with examples where the security of
EC-algorithms is strongly degraded, even for twist secure
curves.
<p>
We show that the usual blindig countermeasures against SCA are
insufficient
(actually they introduce weaknesses)
if no point validation is performed,
or if an attacker has access to certain intermediate points.
In this case the overall security of the system is reduced to
the length of the blinding parameter. We emphazise that our
methods work even in the case of a very high identification
error rate during the SCA-phase. <br></p><p><br></p><p><br></p><br clear="all"><div><div><br>-- <br><div class="gmail_signature">Alexandre Anzala-Yamajako<br><br><br></div>
</div></div></div>