메뉴 건너뛰기




Volumn 53, Issue 6, 2004, Pages 760-768

Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity

Author keywords

Atomicity; Cryptographic algorithms; Elliptic curves; Exponentiation; Protected implementations; Side channel analysis

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); COMPUTATIONAL COMPLEXITY; DATA PRIVACY; NONBIBLIOGRAPHIC RETRIEVAL SYSTEMS;

EID: 3042527150     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2004.13     Document Type: Article
Times cited : (203)

References (17)
  • 3
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • P.C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Proc. Conf. Advances in Cryptology - CRYPTO '96, vol. 1109, pp. 104-113, 1996.
    • (1996) Proc. Conf. Advances in Cryptology - CRYPTO '96 , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 5
    • 3042696081 scopus 로고    scopus 로고
    • Procédé Cryptographique Protégé Contre les Attaques de Type à Canal Caché
    • FR 28 38 210, Apr.
    • B. Chevallier-Mames and M. Joye, Procédé Cryptographique Protégé Contre les Attaques de Type à Canal Caché, Demande de Brevet Français, FR 28 38 210, Apr. 2002.
    • (2002) Demande de Brevet Français
    • Chevallier-Mames, B.1    Joye, M.2
  • 6
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • J.-S. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems," Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '99), vol. 1717, pp. 292-302, 1999.
    • (1999) Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '99) , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 7
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1976.
    • (1976) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 8
    • 0037068668 scopus 로고    scopus 로고
    • Recovering lost efficiency of exponentiation algorithms on smart cards
    • M. Joye, "Recovering Lost Efficiency of Exponentiation Algorithms on Smart Cards," Electronics Letters, vol. 38, no. 19, pp. 1095-1097, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.19 , pp. 1095-1097
    • Joye, M.1
  • 10
    • 0028499370 scopus 로고
    • Fast square-and-multiply exponentiation for rSA
    • L.-C.-K. Hui and K.-Y. Lam, "Fast Square-and-Multiply Exponentiation for RSA," Electronics Letters, vol. 30, no. 17, pp. 1396-1397, 1994.
    • (1994) Electronics Letters , vol.30 , Issue.17 , pp. 1396-1397
    • Hui, L.-C.-K.1    Lam, K.-Y.2
  • 11
    • 0028768786 scopus 로고
    • Efficiency of SS(l) square-and-multiple exponentiation algorithms
    • K.-Y. Lam and L.-C.-K. Hui, "Efficiency of SS(l) Square-and-Multiple Exponentiation Algorithms," Electronics Letters, vol. 30, no. 25, pp. 2115-2116, 1994.
    • (1994) Electronics Letters , vol.30 , Issue.25 , pp. 2115-2116
    • Lam, K.-Y.1    Hui, L.-C.-K.2
  • 14
    • 0000490812 scopus 로고    scopus 로고
    • A survey of fast exponentiation methods
    • D.M. Gordon, "A Survey of Fast Exponentiation Methods," J. Algorithms, vol. 27, pp. 129-146, 1998.
    • (1998) J. Algorithms , vol.27 , pp. 129-146
    • Gordon, D.M.1
  • 16
    • 84944901711 scopus 로고    scopus 로고
    • Protections against differential analysis for elliptic curve cryptography: An algebraic approach
    • M. Joye and C. Tymen, "Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach," Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES 2001), vol. 2162, pp. 377-390, 2001.
    • (2001) Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES 2001) , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 17
    • 84944889837 scopus 로고    scopus 로고
    • MIST: An efficient randomized exponentiation algorithm for resisting power analysis
    • C.D. Walter, "MIST: An Efficient Randomized Exponentiation Algorithm for Resisting Power Analysis," Proc. Conf. Topics in Cryptology - CT-RSA 2002, vol. 2271, pp. 53-66, 2002.
    • (2002) Proc. Conf. Topics in Cryptology - CT-RSA 2002 , vol.2271 , pp. 53-66
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.