메뉴 건너뛰기




Volumn 3439, Issue , 2005, Pages 85-96

Countermeasures for preventing comb method against SCA attacks

Author keywords

Comb method; Elliptic curve; Memory space; Pre computed table; Scalar multiplication; Side channel attacks

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; CRYPTOGRAPHY; MATHEMATICAL TRANSFORMATIONS; OPTIMIZATION; SECURITY OF DATA;

EID: 24644451247     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31979-5_8     Document Type: Conference Paper
Times cited : (30)

References (18)
  • 1
    • 35248871165 scopus 로고    scopus 로고
    • Zero-value point attacks on elliptic curve crytosystems
    • [AT03], LNCS, Springer-Verlag
    • [AT03] T. AKISHITA, T. TAKAGI. Zero-value point attacks on elliptic curve crytosystems. In: ISO 2003, vol. 2851, LNCS, pp. 218-233, Springer-Verlag, 2003.
    • (2003) ISO 2003 , vol.2851 , pp. 218-233
    • Akishita, T.1    Takagi, T.2
  • 2
    • 84937564555 scopus 로고    scopus 로고
    • Software implementation of the NIST elliptic curves over prime fields
    • [BHLM01], D. Naccache, editor, LNCS
    • [BHLM01] M. BROWN, D. HANKERSON, J. LOPEZ, A. MENEZES. Software implementation of the NIST elliptic curves over prime fields. In: Progress in Cryptology CT-RSA 2001, D. Naccache, editor, vol 2020, LNCS, pp. 250-265, 2001.
    • (2001) Progress in Cryptology CT-RSA 2001 , vol.2020 , pp. 250-265
    • Brown, M.1    Hankerson, D.2    Lopez, J.3    Menezes, A.4
  • 3
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • [CMO98], K. Ohta and D. Pei, editors, LNCS
    • [CMO98] H. COHEN, A. MIYAJI, T. ONO. Efficient elliptic curve exponentiation using mixed coordinates. In: Advances in cryptology-Asiacrypt'98, K. Ohta and D. Pei, editors, vol 1514, LNCS, pp. 51-65, 1998.
    • (1998) Advances in Cryptology-Asiacrypt'98 , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 4
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • [Cor99], C.K. Koç and C. Paar, editors, LNCS
    • [Cor99] J.S. CORON. Resistance against differential power analysis for elliptic curve cryptosystems. In: Cryptography Hardware and Embedded Systems-CHES'99, C.K. Koç and C. Paar, editors, vol 1717, LNCS, pp. 292-302, 1999.
    • (1999) Cryptography Hardware and Embedded Systems-CHES'99 , vol.1717 , pp. 292-302
    • Coron, J.S.1
  • 5
    • 2642526170 scopus 로고    scopus 로고
    • Power attacks on a side-channel resistant elliptic curve implementation
    • [GS04], W. GEISELMANN, R. STEINWANDT
    • [GS04] W. GEISELMANN, R. STEINWANDT. Power attacks on a side-channel resistant elliptic curve implementation, Information Processing Letters, vol 91, pp. 29-32, 2004.
    • (2004) Information Processing Letters , vol.91 , pp. 29-32
  • 6
    • 35248816371 scopus 로고    scopus 로고
    • A refined power-analysis attack on elliptic curve cryptosystems
    • [Gou03], LNCS
    • [Gou03] L. GOUBIN. A refined power-analysis attack on elliptic curve cryptosystems. In: Public Key Cryptography International Workshop-PKC 2003, vol 2567, LNCS, pp. 199-210, 2003.
    • (2003) Public Key Cryptography International Workshop-PKC 2003 , vol.2567 , pp. 199-210
    • Goubin, L.1
  • 7
    • 27244452101 scopus 로고    scopus 로고
    • Efficient countermeaaures against power analysis for elliptic curve cryptosystems
    • [IIT04], T. Izu, M. TAKBNAKA
    • [IIT04] K. ITOH, T. Izu, M. TAKBNAKA. Efficient countermeaaures against power analysis for elliptic curve cryptosystems. In: Proceedings of CARDIS-WGC 2004.
    • Proceedings of CARDIS-WGC 2004
    • Itoh, K.1
  • 8
    • 23044530386 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • [JQ01], C.K. Koç, D. Naccache and C. Paar, editors, LNCS
    • [JQ01] M. JOYE, J.J. QUISQUATER, Hessian elliptic curves and side-channel attacks. In: Cryptography Hardware and Embedded Systems-CHES'01, C.K. Koç, D. Naccache and C. Paar, editors, vol 2162, LNCS, pp. 412-420, 2001.
    • (2001) Cryptography Hardware and Embedded Systems-CHES'01 , vol.2162 , pp. 412-420
    • Joye, M.1    Quisquater, J.J.2
  • 9
    • 23044531203 scopus 로고    scopus 로고
    • Protections against differential analysis for elliptic curve cryptography: An algebraic approach
    • [JT01], C. Koç, D. Naccache and C. Paar, editors, LNCS
    • [JT01] M. JOYE, C. TYMEN. Protections against differential analysis for elliptic curve cryptography: an algebraic approach. In: Cryptography Hardware and Embedded Systems-CHES'01, C. Koç, D. Naccache and C. Paar, editors, vol 2162, LNCS, pp. 386-400, 2001.
    • (2001) Cryptography Hardware and Embedded Systems-CHES'01 , vol.2162 , pp. 386-400
    • Joye, M.1    Tymen, C.2
  • 10
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • [KJJ99], P. KOCHER, J. JAFFE, B. JUN, M. Wiener, editor, LNCS
    • [KJJ99] P. KOCHER, J. JAFFE, B. JUN. Differential power analysis. In: Advances in Cryptology-CRYPTO'99, M. Wiener, editor, vol 1666, LNCS, pp. 388-397, 1999.
    • (1999) Advances in Cryptology-CRYPTO'99 , vol.1666 , pp. 388-397
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSA and other systems
    • [Koc96], N. Koblitz, editor, LNCS
    • [Koc96] P. KOCHER. Timing attacks on implementations of Diffie-Hellman, RSA, DSA and other systems. In: Advances in Cryptology-CRYPTO'96, N. Koblitz, editor, vol 1109, LNCS, pp. 104-113, 1996.
    • (1996) Advances in Cryptology-CRYPTO'96 , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 13
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • [LL94], LNCS
    • [LL94] C. LIM, P. LEE. More flexible exponentiation with precomputation. In: Advances in Cryptology-CRYPTO'94, vol 839, LNCS, pp. 95-107, 1994.
    • (1994) Advances in Cryptology-CRYPTO'94 , vol.839 , pp. 95-107
    • Lim, C.1    Lee, P.2
  • 14
    • 23044530344 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the Jacobi form
    • [LS01], P.V. LIARDET, N. SMART, C. Koç, D. Naccache and C. Paar, editors, LNCS
    • [LS01] P.V. LIARDET, N. SMART. Preventing SPA/DPA in ECC systems using the Jacobi form. In Cryptography Hardware and Embedded Systems-CHES'01, C. Koç, D. Naccache and C. Paar, editors, vol 2162, LNCS, pp. 401-411, 2001.
    • (2001) Cryptography Hardware and Embedded Systems-CHES'01 , vol.2162 , pp. 401-411
  • 15
    • 35048860937 scopus 로고    scopus 로고
    • Efficient Countermeasures against RPA, DPA, and SPA
    • [MMM04], H. MAMIYA, A. MIYAJI, H. MORIMOTO, M. Joye, J.J. Quisquater, editors, LNCS
    • [MMM04] H. MAMIYA, A. MIYAJI, H. MORIMOTO. Efficient Countermeasures against RPA, DPA, and SPA. In Cryptography Hardware and Embedded Systems-CHES'04, M. Joye, J.J. Quisquater, editors, vol 3156, LNCS, pp. 343-356, 2004.
    • (2004) Cryptography Hardware and Embedded Systems-CHES'04 , vol.3156 , pp. 343-356
  • 16
    • 84947262754 scopus 로고    scopus 로고
    • Securing elliptic curve point multiplication against side-channel attacks
    • [Möl01], G.I. Davida and Y. Frankel, editors, LNCS
    • [Möl01] B. MÖLLER. Securing elliptic curve point multiplication against side-channel attacks. In: Information Security, G.I. Davida and Y. Frankel, editors, vol 2200, LNCS, pp. 324-334, 2001.
    • (2001) Information Security , vol.2200 , pp. 324-334
    • Möller, B.1
  • 17
    • 84968484435 scopus 로고
    • Speeding up the Pollard and elliptic curve methods of factorization
    • [Mon87], January
    • [Mon87] P.L. MONTGOMERY. Speeding up the Pollard and elliptic curve methods of factorization, Mathematics of Computation, 48(177), pp. 243-264, January 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 18
    • 84945314413 scopus 로고    scopus 로고
    • A Second-Order DPA attacks breaks a window-method based countermeasure against side channel attacks
    • [OS02], Information Security Conference (ISC 2002)
    • [OS02] K. OKEYA, K. SAKURAI. A Second-Order DPA attacks breaks a window-method based countermeasure against side channel attacks, Information Security Conference (ISC 2002), LNCS 2433, pp. 389-401, 2002.
    • (2002) LNCS , vol.2433 , pp. 389-401
    • Okeya, K.1    Sakurai, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.