메뉴 건너뛰기




Volumn 2523, Issue , 2003, Pages 98-113

Implementation of Elliptic Curve Cryptography with Built-in Counter Measures against Side Channel Attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; CRYPTOGRAPHY; EMBEDDED SYSTEMS; GEOMETRY; HARDWARE; PUBLIC KEY CRYPTOGRAPHY;

EID: 24744463146     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36400-5_9     Document Type: Article
Times cited : (16)

References (31)
  • 3
    • 84958979095 scopus 로고    scopus 로고
    • Weierstrass elliptic curves and side-channel attacks
    • LNCS 2274
    • Brier, E., Joye,: Weierstrass elliptic curves and side-channel attacks. Proc. Public Key Cryptography (PKC 2002), LNCS 2274 (2002) 335-345
    • (2002) Proc. Public Key Cryptography (PKC 2002) , pp. 335-345
    • Brier, E.1    Joye2
  • 4
    • 84937564555 scopus 로고    scopus 로고
    • Software implementation of the NIST elliptic curves over prime fields
    • LNCS 2020
    • Brown, M., Hankerson, D., Lopez, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. Proc. CT-RSA 2001, LNCS 2020 (2001) 250-265
    • (2001) Proc. CT-RSA 2001 , pp. 250-265
    • Brown, M.1    Hankerson, D.2    Lopez, J.3    Menezes, A.4
  • 6
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • Crypto'99, LNCS 1666
    • Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. Proc. Advances in Cryptology - Crypto'99, LNCS 1666 (1999) 398-412
    • (1999) Proc. Advances in Cryptology , pp. 398-412
    • Chari, S.1    Jutla, C.2    Rao, J.3    Rohatgi, P.4
  • 7
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis attacks for elliptic curve cryptosystems
    • LNCS 1717
    • Coron, J.-S.: Resistance against differential power analysis attacks for elliptic curve cryptosystems. Proc. Cryptographic Hardware and Embedded Systems (CHES'99), LNCS 1717 (1999) 292-302
    • (1999) Proc. Cryptographic Hardware and Embedded Systems (CHES'99) , pp. 292-302
    • Coron, J.-S.1
  • 8
    • 0000490812 scopus 로고    scopus 로고
    • A survey of fast exponentiation methods
    • Gordon, D. M.: A survey of fast exponentiation methods. J. Algorithms 27 (1998) 129-146
    • (1998) J. Algorithms , vol.27 , pp. 129-146
    • Gordon, D.M.1
  • 10
    • 68549092452 scopus 로고    scopus 로고
    • Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems
    • LNCS 1965
    • Hasan, M. A.: Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems. Proc. Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965 (2000) 93-108
    • (2000) Proc. Cryptographic Hardware and Embedded Systems (CHES 2000) , pp. 93-108
    • Hasan, M.A.1
  • 13
    • 84958955271 scopus 로고    scopus 로고
    • A fast parallel elliptic curve multiplication resistant against side channel attacks
    • LNCS 2274
    • Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. Proc. Public Key Cryptography (PKC 2002), LNCS 2274 (2002) 280-296
    • (2002) Proc. Public Key Cryptography (PKC 2002) , pp. 280-296
    • Izu, T.1    Takagi, T.2
  • 15
    • 84944901711 scopus 로고    scopus 로고
    • Protection against Differential Power Analysis for elliptic curve cryptography - An algebraic approach
    • LNCS 2162
    • Joye, M., Tymen, Ch.: Protection against Differential Power Analysis for elliptic curve cryptography - An algebraic approach. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 377-390
    • (2001) Proc. Cryptographic Hardware and Embedded Systems (CHES 2001) , pp. 377-390
    • Joye, M.1    Tymen, Ch.2
  • 17
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems
    • , LNCS 1109
    • Kocher, P.: Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems. Proc. Advances in Cryptology - Crypto'96, LNCS 1109 (1996) 104-113
    • (1996) Proc. Advances in Cryptology - Crypto'96 , pp. 104-113
    • Kocher, P.1
  • 23
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T. S., Dabbish, E. A., Sloan, R. H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51 (5) (2002) 541-552
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 24
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • Montgomery, P.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computations, 48 (1987) 243-264
    • (1987) Mathematics of Computations , vol.48 , pp. 243-264
    • Montgomery, P.1
  • 25
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks Elliptic Curve cryptosystems even secure against the timing attacks
    • LNCS 1977
    • Okeya, K., Sakaurai, K.: Power analysis breaks Elliptic Curve cryptosystems even secure against the timing attacks. Proc. INDOCRYPT 2000, LNCS 1977 (2000) 178-190
    • (2000) Proc. INDOCRYPT 2000 , pp. 178-190
    • Okeya, K.1    Sakaurai, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.