메뉴 건너뛰기




Volumn 3928 LNCS, Issue , 2006, Pages 151-164

Power analysis to ECC using differential power between multiplication and squaring

Author keywords

DPA; Elliptic curve cryptosystems; Modular multiplication; Power analysis; Smart cards

Indexed keywords

CMOS INTEGRATED CIRCUITS; COMPUTER SIMULATION; CRYPTOGRAPHY; PROGRAM PROCESSORS; SIGNAL PROCESSING; SMART CARDS; GEOMETRY; HARDWARE SECURITY; SIDE CHANNEL ATTACK; TRANSPORTATION;

EID: 33745805198     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11733447_11     Document Type: Conference Paper
Times cited : (10)

References (21)
  • 1
    • 33745789300 scopus 로고    scopus 로고
    • Hardware implementation of elliptic curve cryptosystems for contactless IC card
    • in Japanese
    • T. Akishita, K. Iizuka, and H. Sato, "Hardware Implementation of Elliptic Curve Cryptosystems for Contactless IC Card", Proceedings of SCIS 2002, 15B-1, pp.1107-1112, 2002 (in Japanese).
    • (2002) Proceedings of SCIS 2002 , vol.15 B-1 , pp. 1107-1112
    • Akishita, T.1    Iizuka, K.2    Sato, H.3
  • 2
    • 35248871165 scopus 로고    scopus 로고
    • Zero-value point attack on elliptic curve cryptosystems
    • Information Security - ISC 2003, Springer-Verlag
    • T. Akishita and T. Takagi, "Zero-Value Point Attack on Elliptic Curve Cryptosystems", Information Security - ISC 2003, LNCS 2851, pp.218-233, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2851 , pp. 218-233
    • Akishita, T.1    Takagi, T.2
  • 4
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraas elliptic curve and side-channel attacks
    • Public Key Cryptography - PKC 2002, Springer-Verlag
    • E. Brier and M. Joye, "Weierstraas Elliptic Curve and Side-Channel Attacks", Public Key Cryptography - PKC 2002, LNCS 2274, pp.335-345, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2274 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 5
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Cryptographic Hardware and Embedded Systems - CHES '99, Springer-Verlag
    • J.-S. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems", Cryptographic Hardware and Embedded Systems - CHES '99, LNCS 1717, pp.292-302, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 6
    • 35248816371 scopus 로고    scopus 로고
    • A refined power-analysis attack on elliptic curve cryptosystems
    • Public Key Cryptography - PKC 2003, Springer-Verlag
    • L. Goubin, "A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems", Public Key Cryptography - PKC 2003, LNCS 2567, pp.199-211, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2567 , pp. 199-211
    • Goubin, L.1
  • 8
    • 23944497026 scopus 로고    scopus 로고
    • Exceptional procedure attack on elliptic curve cryptosystems
    • Public Key Cryptography - PKC 2003, Springer-Verlag
    • T. Izu and T. Takagi, "Exceptional Procedure Attack on Elliptic Curve Cryptosystems", Public Key Cryptography - PKC 2003, LNCS 2567, pp.224-239, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2567 , pp. 224-239
    • Izu, T.1    Takagi, T.2
  • 9
    • 84944901711 scopus 로고    scopus 로고
    • Protection against differential analysis for elliptic curve cryptography
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
    • M. Joye and C. Tymen, "Protection against Differential Analysis for Elliptic Curve Cryptography", Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp.377-390, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 10
    • 84944884283 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
    • M. Joye and J.-J. Quisquater, "Hessian Elliptic Curves and Side-Channel Attacks", Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp.402-410, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 402-410
    • Joye, M.1    Quisquater, J.-J.2
  • 11
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Advances in Cryptology - CRYPTO '99, Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", Advances in Cryptology - CRYPTO '99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 12
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the jacobi form
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
    • P.-Y. Liardet and N.P. Smart, "Preventing SPA/DPA in ECC Systems Using the Jacobi Form", Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp.391-401, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 391-401
    • Liardet, P.-Y.1    Smart, N.P.2
  • 13
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks of modular exponentiation in smartcards
    • Cryptographic Hardware and Embedded Systems - CHES '99, Springer-Verlag
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", Cryptographic Hardware and Embedded Systems - CHES '99, LNCS 1717, pp.144-157, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 14
    • 35048860937 scopus 로고    scopus 로고
    • Efficient countermeasure against RPA, DPA, and SPA
    • Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
    • H. Mamiya, A. Miyaji, and H. Morimoto, "Efficient Countermeasure against RPA, DPA, and SPA", Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, pp.343-356, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3156 , pp. 343-356
    • Mamiya, H.1    Miyaji, A.2    Morimoto, H.3
  • 15
    • 84968484435 scopus 로고
    • Speeding the pollard and elliptic curve methods of factorization
    • P.L. Montgomery, "Speeding the Pollard and Elliptic Curve Methods of Factorization", Mathematics of Computation, vol.48, pp.243-264, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 243-264
    • Montgomery, P.L.1
  • 16
    • 84957794840 scopus 로고    scopus 로고
    • Elliptic curves with the montgomery-form and their cryptographic applications
    • Public Key Cryptography - PKC 2000, Springer-Verlag
    • K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications", Public Key Cryptography - PKC 2000, LNCS 1751, pp.238-257, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1751 , pp. 238-257
    • Okeya, K.1    Kurumatani, H.2    Sakurai, K.3
  • 17
    • 84949949652 scopus 로고    scopus 로고
    • A fast scalar multiplication method with randomized projective coordinate on a montgomery-form elliptic curve secure against side channel attacks
    • Information Security and Cryptology - ICISC 2001, Springer-Verlag
    • K. Okeya, K. Miyazaki, and K. Sakurai, "A Fast Scalar Multiplication Method with Randomized Projective Coordinate on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks", Information Security and Cryptology - ICISC 2001, LNCS 2288, pp.428-439, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2288 , pp. 428-439
    • Okeya, K.1    Miyazaki, K.2    Sakurai, K.3
  • 18
    • 35248821153 scopus 로고    scopus 로고
    • An analysis of goubin's refined power analysis attack
    • Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag
    • N.P. Smart, "An Analysis of Goubin's Refined Power Analysis Attack", Cryptographic Hardware and Embedded Systems - CHES 2003, LNCS 2779, pp.281-290, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2779 , pp. 281-290
    • Smart, N.P.1
  • 19
    • 27244431906 scopus 로고    scopus 로고
    • Random switching logic: A countermeasure against DPA based on transition probability
    • D. Suzuki, M. Saeki, and T. Ichikawa, "Random Switching Logic: A Countermeasure against DPA based on Transition Probability", IACR Cryptology ePrint Archive 2004/346, 2004. http://eprint.iacr.org/2004/346/
    • (2004) IACR Cryptology ePrint Archive , vol.2004 , Issue.346
    • Suzuki, D.1    Saeki, M.2    Ichikawa, T.3
  • 20
    • 27244445509 scopus 로고    scopus 로고
    • DPA leakage model for CMOS logic circuits
    • Cryptographic Hardware and Embedded Systems - CHES 2005, Springer-Verlag
    • D. Suzuki, M. Saeki, and T. Ichikawa, "DPA Leakage Model for CMOS Logic Circuits", Cryptographic Hardware and Embedded Systems - CHES 2005, LNCS 3659, pp.366-382, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3659 , pp. 366-382
    • Suzuki, D.1    Saeki, M.2    Ichikawa, T.3
  • 21
    • 35048841251 scopus 로고    scopus 로고
    • Simple power analysis of unified code for ECC double and add
    • Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
    • C.D. Walter, "Simple Power Analysis of Unified Code for ECC Double and Add", Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, pp.191-204, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3156 , pp. 191-204
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.