메뉴 건너뛰기




Volumn 3357, Issue , 2004, Pages 54-68

On XTR and side-channel analysis

Author keywords

Finite field; LUC; Power analysis; Side channel attack; XTR

Indexed keywords

SMART CARDS; BANDWIDTH; CURVE FITTING; SECURITY SYSTEMS;

EID: 24144499349     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30564-4_4     Document Type: Article
Times cited : (4)

References (26)
  • 1
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraß elliptic curves and side-channel attacks
    • É. Brier and M. Joye. Weierstraß elliptic curves and side-channel attacks. PKC'02, LNCS 2274, pages 335-345.
    • PKC'02, LNCS , vol.2274 , pp. 335-345
    • Brier, É.1    Joye, M.2
  • 2
    • 33645605146 scopus 로고
    • Supplement to implementation of a new primality test
    • H. Cohen and A. K. Lenstra. Supplement to implementation of a new primality test. Mathematics of Computation, 48(177): S1-S4, 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177
    • Cohen, H.1    Lenstra, A.K.2
  • 3
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • J.-S. Coron. Resistance against differential power analysis for elliptic curve cryptosystems. CHES'99, LNCS 1717, pages 292-302.
    • CHES'99, LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 4
    • 35248815162 scopus 로고    scopus 로고
    • Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor
    • C. H. Gebotys and R. J. Gebotys. Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor. CHES'02, LNCS 2523, pages 114-128.
    • CHES'02, LNCS , vol.2523 , pp. 114-128
    • Gebotys, C.H.1    Gebotys, R.J.2
  • 5
    • 33645584365 scopus 로고    scopus 로고
    • On insecurity of the side channel attack on xtr
    • To appear. The Institute of Electronics, Information and Communication Engineers
    • D.-G. Han, J. Lim, and K. Sakurai. On insecurity of the side channel attack on xtr. In The 2004 Symposium on Cryptography and Information Security (SCIS'04), page To appear. The Institute of Electronics, Information and Communication Engineers, 2004.
    • (2004) The 2004 Symposium on Cryptography and Information Security (SCIS'04)
    • Han, D.-G.1    Lim, J.2    Sakurai, K.3
  • 6
    • 35248898400 scopus 로고    scopus 로고
    • Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA
    • K. Itoh, T. Izu, and M. Takenaka. Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA. CHES'02, LNCS 2523, pages 129-143.
    • CHES'02, LNCS , vol.2523 , pp. 129-143
    • Itoh, K.1    Izu, T.2    Takenaka, M.3
  • 7
    • 23944497026 scopus 로고    scopus 로고
    • Exceptional procedure attack on elliptic curve cryptosystems
    • T. Izu and T. Takagi. Exceptional procedure attack on elliptic curve cryptosystems. PKC'03, LNCS 2567, pages 224-239.
    • PKC'03, LNCS , vol.2567 , pp. 224-239
    • Izu, T.1    Takagi, T.2
  • 8
    • 85062143504 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • M. Joye and J.-J. Quisquater. Hessian elliptic curves and side-channel attacks. CHES'01, LNCS 2162, pages 93-100.
    • CHES'01, LNCS , vol.2162 , pp. 93-100
    • Joye, M.1    Quisquater, J.-J.2
  • 9
    • 84944901711 scopus 로고    scopus 로고
    • Protection against differential power analysis for elliptic curve cryptography - An algebraic approach
    • M. Joye and C. Tymen. Protection against differential power analysis for elliptic curve cryptography - an algebraic approach. CHES'01, LNCS 2162, pages 377-390.
    • CHES'01, LNCS , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 10
    • 35248874869 scopus 로고    scopus 로고
    • The Montgomery powering ladder
    • M. Joye and S.-M. Yen. The Montgomery powering ladder. CHES'02, LNCS 2523, pages 291-302.
    • CHES'02, LNCS , vol.2523 , pp. 291-302
    • Joye, M.1    Yen, S.-M.2
  • 11
    • 35248868313 scopus 로고    scopus 로고
    • Hidden markov model cryptanalysis
    • C. Karlof and D.Wagner. Hidden markov model cryptanalysis. CHES'03, LNCS 2779, pages 17-34.
    • CHES'03, LNCS , vol.2779 , pp. 17-34
    • Karlof, C.1    Wagner, D.2
  • 12
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Crypto'96,LNCS 1109, pages 104-113.
    • Crypto'96,LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 14
    • 0346801364 scopus 로고
    • Computer technology applied to the theory of numbers
    • Math. Assoc. Amer. (distributed by Prentice-Hall, Englewood Cliffs, N.J.)
    • D. H. Lehmer. Computer technology applied to the theory of numbers. Studies in Number Theory, volume 6 of MAA Studies in Mathematics, pages 117-151. Math. Assoc. Amer. (distributed by Prentice-Hall, Englewood Cliffs, N.J.), 1969.
    • (1969) Studies in Number Theory, Volume 6 of MAA Studies in Mathematics , vol.6 , pp. 117-151
    • Lehmer, D.H.1
  • 15
    • 84957881669 scopus 로고    scopus 로고
    • Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields
    • A. K. Lenstra. Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields. ACISP'97, LNCS 1270, pages 127-138.
    • ACISP'97, LNCS , vol.1270 , pp. 127-138
    • Lenstra, A.K.1
  • 18
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the Jacobi form
    • P.-Y. Liardet and N. P. Smart. Preventing SPA/DPA in ECC systems using the Jacobi form. CHES'01, LNCS 2162, pages 391-401.
    • CHES'01, LNCS , vol.2162 , pp. 391-401
    • Liardet, P.-Y.1    Smart, N.P.2
  • 19
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks on modular exponentiation in smartcards
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power analysis attacks on modular exponentiation in smartcards. CHES'99, LNCS 1717, pages 144-157.
    • CHES'99, LNCS , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 20
    • 0347502150 scopus 로고
    • Revised (1992) version from ftp.cwi.nl: /pub/pmontgom/Lucas.ps.gz
    • m-n) via Lucas chains. Revised (1992) version from ftp.cwi.nl: /pub/pmontgom/Lucas.ps.gz, 1983.
    • (1983) m-n) Via Lucas Chains
    • Montgomery, P.L.1
  • 21
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems secure against timing attack
    • K. Okeya and K. Sakurai. Power analysis breaks elliptic curve cryptosystems secure against timing attack. Indocrypt'00, LNCS 1977, pages 178-190.
    • Indocrypt'00, LNCS , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 22
    • 84944889933 scopus 로고    scopus 로고
    • Randomized addition-subtraction chains as a countermeasure against power attacks
    • E. Oswald and M. Aigner. Randomized addition-subtraction chains as a countermeasure against power attacks. CHES'01, LNCS 2162, pages 39-50.
    • CHES'01, LNCS , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 23
    • 68549107606 scopus 로고    scopus 로고
    • Protecting smart cards from passive power analysis with detached power supplies
    • A. Shamir. Protecting smart cards from passive power analysis with detached power supplies. CHES'00, LNCS 1965, pages 71-77.
    • CHES'00, LNCS , vol.1965 , pp. 71-77
    • Shamir, A.1
  • 25
    • 35248854585 scopus 로고    scopus 로고
    • Efficient subgroup exponentiation in quadratic and sixth degree extensions
    • M. Stam and A. K. Lenstra. Efficient subgroup exponentiation in quadratic and sixth degree extensions. CHES'02, LNCS 2523, pages 318-332.
    • CHES'02, LNCS , vol.2523 , pp. 318-332
    • Stam, M.1    Lenstra, A.K.2
  • 26
    • 24744463146 scopus 로고    scopus 로고
    • Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks
    • E. Trichina and A. Bellezza. Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks. CHES'02, LNCS 2523, pages 98-113.
    • CHES'02, LNCS , vol.2523 , pp. 98-113
    • Trichina, E.1    Bellezza, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.