메뉴 건너뛰기




Volumn E88-A, Issue 1, 2005, Pages 161-171

Fast elliptic curve multiplications resistant against side channel attacks

Author keywords

Elliptic curve cryptosystems (ECC); Scalar multiplication; Side channel attacks; SIMD operation

Indexed keywords

COMPUTATIONAL METHODS; CONSTRAINT THEORY; OPTIMIZATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 27544457322     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/E88-A.1.161     Document Type: Conference Paper
Times cited : (14)

References (37)
  • 1
    • 84947239944 scopus 로고    scopus 로고
    • Elliptic curve arithmetic using SIMD
    • ISC2001, Springer-Verlag
    • K. Aoki, F. Hoshino, T. Kobayashi, and H. Oguro, "Elliptic curve arithmetic using SIMD," ISC2001, LNCS 2200, pp.235-247, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2200 , pp. 235-247
    • Aoki, K.1    Hoshino, F.2    Kobayashi, T.3    Oguro, H.4
  • 4
    • 35248883676 scopus 로고    scopus 로고
    • Countermeasures against side-channel attacks for elliptic curve cryptosystems
    • A. Bellezza, "Countermeasures against side-channel attacks for elliptic curve cryptosystems," Cryptology ePrint Archive, 2001/103, 2001.
    • (2001) Cryptology EPrint Archive , vol.2001 , Issue.103
    • Bellezza, A.1
  • 5
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraβ elliptic curves and side-channel attacks
    • PKC2002, Springer-Verlag
    • E. Brier and M. Joye, "Weierstraβ elliptic curves and side-channel attacks," PKC2002, LNCS 2274, pp.335-345, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2274 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 7
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • CHES'99, Springer-Verlag
    • J. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," CHES'99, LNCS 1717, pp.292-302, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.1
  • 8
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • Asiacrypt'98, Springer-Verlag
    • H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," Asiacrypt'98, LNCS 1514, pp.51-65, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 9
    • 84944905303 scopus 로고    scopus 로고
    • Universal exponentiation algorithm - A first step towards provable SPA-resistance
    • CHES2001, Springer-Verlag
    • C. Clavier and M. Joye, "Universal exponentiation algorithm - A first step towards provable SPA-resistance," CHES2001, LNCS 2162, pp.300-308, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 300-308
    • Clavier, C.1    Joye, M.2
  • 11
    • 0000490812 scopus 로고    scopus 로고
    • A survey of fast exponentiation methods
    • D. Gordon, "A survey of fast exponentiation methods," J. Algorithms, vol.27, pp.129-146, 1998.
    • (1998) J. Algorithms , vol.27 , pp. 129-146
    • Gordon, D.1
  • 13
    • 35248898400 scopus 로고    scopus 로고
    • Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA
    • CHES 2002, Springer-Verlag
    • K. Itoh, T. Izu, and M. Takenaka, "Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA," CHES 2002, LNCS 2523, pp.129-143, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2523 , pp. 129-143
    • Itoh, K.1    Izu, T.2    Takenaka, M.3
  • 14
    • 35248873415 scopus 로고    scopus 로고
    • A practical countermeasure against address-bit differential power analysis
    • CHES 2003, Springer-Verlag
    • K. Itoh, T. Izu, and M. Takenaka, "A practical countermeasure against address-bit differential power analysis," CHES 2003, LNCS 2779, pp.382-396, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2779 , pp. 382-396
    • Itoh, K.1    Izu, T.2    Takenaka, M.3
  • 15
    • 84974665915 scopus 로고    scopus 로고
    • Improved elliptic curve multiplication methods resistant against side channel attacks
    • Indocrypt 2002
    • T. Izu, B. Möller, and T. Takagi, "Improved elliptic curve multiplication methods resistant against side channel attacks," Indocrypt 2002, LNCS 2551, pp.296-313, 2002.
    • (2002) LNCS , vol.2551 , pp. 296-313
    • Izu, T.1    Möller, B.2    Takagi, T.3
  • 16
    • 0842327123 scopus 로고    scopus 로고
    • A fast parallel elliptic curve multiplication resistant against side channel attacks
    • CORR 2002-03, University of Waterloo
    • T. Izu and T. Takagi, "A fast parallel elliptic curve multiplication resistant against side channel attacks," Technical Report of CACR, CORR 2002-03, University of Waterloo, 2002.
    • (2002) Technical Report of CACR
    • Izu, T.1    Takagi, T.2
  • 17
    • 84958955271 scopus 로고    scopus 로고
    • A fast parallel elliptic curve multiplication resistant against side channel attacks
    • PKC 2002
    • T. Izu and T. Takagi, "A fast parallel elliptic curve multiplication resistant against side channel attacks," PKC 2002, LNCS 2274, pp.280-296, 2002.
    • (2002) LNCS , vol.2274 , pp. 280-296
    • Izu, T.1    Takagi, T.2
  • 18
    • 0842310312 scopus 로고    scopus 로고
    • Fast elliptic curve multiplications with SIMD operations
    • Jan.
    • T. Izu and T. Takagi, "Fast elliptic curve multiplications with SIMD operations," IEICE Trans. Fundamentals, vol.E87-A, no. 1, pp.85-93, Jan. 2004.
    • (2004) IEICE Trans. Fundamentals , vol.E87-A , Issue.1 , pp. 85-93
    • Izu, T.1    Takagi, T.2
  • 19
    • 84944884283 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • CHES2001, Springer-Verlag
    • M. Joye and J. Quisquater, "Hessian elliptic curves and side-channel attacks," CHES2001, LNCS 2162, pp.402-410, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 402-410
    • Joye, M.1    Quisquater, J.2
  • 20
    • 84944901711 scopus 로고    scopus 로고
    • Protections against differential analysis for elliptic curve cryptography
    • CHES2001, Springer-Verlag
    • M. Joye and C. Tymen, "Protections against differential analysis for elliptic curve cryptography," CHES2001, LNCS 2162, pp.377-390, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 21
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems," Math. Comput., vol.48, pp.203-209, 1987.
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 22
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Crypto'96, Springer-Verlag
    • C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," Crypto'96, LNCS 1109, pp. 104-113, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, C.1
  • 23
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Crypto'99, Springer-Verlag
    • C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Crypto'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, C.1    Jaffe, J.2    Jun, B.3
  • 25
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the Jacobi form
    • CHES2001, Springer-Verlag
    • P. Liardet and N. Smart, "Preventing SPA/DPA in ECC systems using the Jacobi form," CHES2001, LNCS 2162, pp.391-401, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 391-401
    • Liardet, P.1    Smart, N.2
  • 26
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • CRYPTO'85, Springer-Verlag
    • V.S. Miller, "Use of elliptic curves in cryptography," CRYPTO'85, LNCS 218, pp.417-426, Springer-Verlag, 1986.
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 27
    • 84947262754 scopus 로고    scopus 로고
    • Securing elliptic curve point multiplication against side-channel attacks
    • ISC 2001, Springer-Verlag, .Weiner
    • B. Möller, "Securing elliptic curve point multiplication against side-channel attacks," ISC 2001, LNCS 2200, pp.324-334, Springer-Verlag, 2001.Weiner
    • (2001) LNCS , vol.2200 , pp. 324-334
    • Möller, B.1
  • 28
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods for factorizations
    • P. Montgomery, "Speeding the Pollard and elliptic curve methods for factorizations," Math. Comput., vol.48, pp.243-264, 1987.
    • (1987) Math. Comput. , vol.48 , pp. 243-264
    • Montgomery, P.1
  • 31
    • 84957794840 scopus 로고    scopus 로고
    • Elliptic curves with the Montgomery form and their cryptographic applications
    • PKC2000, Springer-Verlag
    • K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic curves with the Montgomery form and their cryptographic applications," PKC2000, LNCS 1751, pp.446-465, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1751 , pp. 446-465
    • Okeya, K.1    Kurumatani, H.2    Sakurai, K.3
  • 32
    • 84949949652 scopus 로고    scopus 로고
    • A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks
    • ICISC 2001, Springer-Verlag
    • K. Okeya, K. Miyazaki, and K. Sakurai, "A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks," ICISC 2001, LNCS 2288, pp.428-439, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2288 , pp. 428-439
    • Okeya, K.1    Miyazaki, K.2    Sakurai, K.3
  • 33
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
    • Indocrypt 2000, Springer-Verlag
    • K. Okeya and K. Sakurai, "Power analysis breaks elliptic curve cryptosystems even secure against the timing attack," Indocrypt 2000, LNCS 1977, pp.178-190, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 34
    • 85027140454 scopus 로고    scopus 로고
    • DPA-Gegenmaβnahmen bei einer ECDSA-Implementierung auf Chipkarten
    • presented at BSI, ECC Brainpool
    • M. Seysen, "DPA-Gegenmaβnahmen bei einer ECDSA-Implementierung auf Chipkarten," presented at DPA Workshop, BSI, ECC Brainpool, 2001.
    • (2001) DPA Workshop
    • Seysen, M.1
  • 35
    • 84944876350 scopus 로고    scopus 로고
    • The Hessian form of an elliptic curve
    • CHES2001, Springer-Verlag
    • N. Smart, "The Hessian form of an elliptic curve," CHES2001, LNCS 2162, pp.118-125, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 118-125
    • Smart, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.