메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 154-167

Improvement on Ha-Moon randomized exponentiation algorithm

Author keywords

Differential power analysis (DPA); Modular exponentiation; Physical cryptanalysis; Randomized recoding; Side channel attack; Signed digit recoding; Simple power analysis (SPA)

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; ENCODING (SYMBOLS); PARAMETER ESTIMATION;

EID: 24944495384     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_12     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 1
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Advances in Cryptology - EURO-CRYPT'97, Springer-Verlag
    • Dan Boneh, Richard A. DeMillo, and Richard J. Lipton, "On the importance of checking cryptographic protocols for faults," Advances in Cryptology - EURO-CRYPT'97, Lecture Notes in Computer Science 1233, pp. 37-51, Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 2
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Cryptographic Hardware and Embedded Systems - CHES'99, Springer-Verlag
    • Jean-Sébastien Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," Cryptographic Hardware and Embedded Systems - CHES'99, Lecture Notes in Computer Science 1717, pp. 292-302, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 3
    • 35248881073 scopus 로고    scopus 로고
    • The doubling attack - Why upwards is better than downwards
    • Cryptographic Hardware and Embedded Systems - CHES'03, Springer-Verlag
    • Pierre-Alain Fouque and Frederic Valette, "The Doubling Attack - Why Upwards Is Better than Downwards," Cryptographic Hardware and Embedded Systems - CHES'03, Lecture Notes in Computer Science 2779, pp. 269-280, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 269-280
    • Fouque, P.-A.1    Valette, F.2
  • 4
    • 35048852643 scopus 로고    scopus 로고
    • Defeating countermeasures based on randomized BSD representations
    • Cryptographic Hardware and Embedded Systems - CHES'04, Springer-Verlag
    • Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, and Frédéric Valette, "Defeating Countermeasures Based on Randomized BSD Representations," Cryptographic Hardware and Embedded Systems - CHES'04, Lecture Notes in Computer Science 3156, pp. 312-327, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 312-327
    • Fouque, P.-A.1    Muller, F.2    Poupard, G.3    Valette, F.4
  • 5
    • 35248877672 scopus 로고    scopus 로고
    • Randomized signed-scalar multiplication of ECC to resist power attacks
    • Cryptographic Hardware and Embedded Systems - CHES'02, Springer-Verlag
    • JaeCheol Ha and SangJae Moon, "Randomized signed-scalar multiplication of ECC to resist power attacks," Cryptographic Hardware and Embedded Systems - CHES'02, Lecture Notes in Computer Science 2523, pp. 551-563, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 551-563
    • Ha, J.1    Moon, S.2
  • 6
    • 35248868313 scopus 로고    scopus 로고
    • Hidden Markov model cryptanalysis
    • Cryptographic Hardware and Embedded Systems - CHES'03, Springer-Verlag
    • Chris Karlof and David Wagner, "Hidden Markov model cryptanalysis," Cryptographic Hardware and Embedded Systems - CHES'03, Lecture Notes in Computer Science 2779, pp. 17-34, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 17-34
    • Karlof, C.1    Wagner, D.2
  • 7
    • 84943632039 scopus 로고    scopus 로고
    • Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Advanced in Cryptology - CRYPTO'96, Springer-Verlag
    • Paul Kocher, "Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems," Advanced in Cryptology - CRYPTO'96, Lecture Notes in Computer Science 1109, pp. 104-113, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 8
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Advanced in Cryptology - CRYPTO'99, Springer-Verlag
    • Paul Kocher, Joshua Jaffe, and Benjamin Jun, "Differential power analysis," Advanced in Cryptology - CRYPTO'99, Lecture Notes in Computer Science 1666, pp. 388-397, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 9
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks of modular exponentiation in smartcards
    • Cryptographic Hardware and Embedded Systems (CHES'99), Springer-Verlag
    • Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards," Cryptographic Hardware and Embedded Systems (CHES'99), Lecture Notes in Computer Science 1717, pp. 144-157, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 10
    • 84947425601 scopus 로고    scopus 로고
    • On insecurity of the side channel attack counter-measure using addition-subtraction chains under distinguishability between addition and doubling
    • Information Security and Privacy - ACISP'02, Springer-Verlag
    • Katsuyuki Okeya and Kouichi Sakurai, "On insecurity of the side channel attack counter-measure using addition-subtraction chains under distinguishability between addition and doubling," Information Security and Privacy - ACISP'02, Lecture Notes in Computer Science 2384, pp. 420-435, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2384 , pp. 420-435
    • Okeya, K.1    Sakurai, K.2
  • 11
    • 0348155940 scopus 로고    scopus 로고
    • Side channel attack on Ha-Moon's countermeasure of randomized signed scalar multiplication
    • Progress in Cryptology - INDOCRYPT 2003, Springer-Verlag
    • Katsuyuki Okeya and Dong-Guk Han, "Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication," Progress in Cryptology - INDOCRYPT 2003, Lecture Notes in Computer Science 2904, pp. 334-348, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2904 , pp. 334-348
    • Okeya, K.1    Han, D.-G.2
  • 12
    • 84944889933 scopus 로고    scopus 로고
    • Randomized addition-subtraction chains as a countermeasure against power attacks
    • Cryptographic Hardware and Embedded Systems - CHES'01, Springer-Verlag
    • Elisabeth Oswald and Manfred Aigner, "Randomized addition-subtraction chains as a countermeasure against power attacks," Cryptographic Hardware and Embedded Systems - CHES'01, Lecture Notes in Computer Science 2162, pp. 39-50, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 13
    • 84949979593 scopus 로고    scopus 로고
    • A countermeasure against one physical cryptanalysis may benefit another attack
    • Information Security and Cryptology - ICISC'01, Springer-Verlag
    • Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon, "A countermeasure against one physical cryptanalysis may benefit another attack," Information Security and Cryptology - ICISC'01, Lecture Notes in Computer Science 2288, pp. 414-427, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2288 , pp. 414-427
    • Yen, S.-M.1    Kim, S.2    Lim, S.3    Moon, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.