메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 268-283

Flexible exponentiation with resistance to side channel attacks

Author keywords

Fractional width; RSA; Side channel attacks; Simple power analysis

Indexed keywords

CACHE MEMORY; EFFICIENCY; PROGRAM PROCESSORS; SERVERS; TAMPER RESISTANT PACKAGING;

EID: 33746654441     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_18     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 1
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • W. Fumy (Ed.): Advances in Cryptology-Eurocrypt'97. Springer-Verlag
    • Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In W. Fumy (Ed.): Advances in Cryptology-Eurocrypt'97. LNCS 1233, pp.37-51. Springer-Verlag (1997).
    • (1997) LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.2    Lipton, R.3
  • 2
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • IEEE Computer Society
    • Chevallier-Mames, B., Ciet, M., Joye, M.: Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. In IEEE Transactions on Computers, 53(6), pp.760-768. IEEE Computer Society (2004).
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevallier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 3
    • 84947916423 scopus 로고    scopus 로고
    • Finding a small root of a bivariate integer equation; factoring with high bits known
    • U. Maurer (Ed.): Advances in Cryptology-Eurocrypt'96. Springer-Verlag
    • Coppersmith, D.: Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known. In U. Maurer (Ed.): Advances in Cryptology-Eurocrypt'96. LNCS 1070, pp.178-189. Springer-Verlag (1996).
    • (1996) LNCS , vol.1070 , pp. 178-189
    • Coppersmith, D.1
  • 4
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Ç. Koç and C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'99. Springer-Verlag
    • Coron, J.-S.: Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems. In Ç. Koç and C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'99. LNCS 1717, pp.292-302. Springer-Verlag (1999).
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 5
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener (Ed.): Advances in Cryptology^Crypto'99. Springer-Verlag
    • Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In M. Wiener (Ed.): Advances in Cryptology^Crypto'99. LNCS 1666, pp.388-397. Springer-Verlag (1999).
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • N. Koblitz (Ed.): Advances in Cryptology-Crypto'96. Springer-Verlag
    • Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In N. Koblitz (Ed.): Advances in Cryptology-Crypto'96. LNCS 1109, pp.104-113. Springer-Verlag (1996).
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 7
    • 84947262754 scopus 로고    scopus 로고
    • Securing elliptic curve point multiplication against side-channel attacks
    • G. Davida, Y. Frankel (Eds.): Information Security-ISC'01. Springer-Verlag
    • Möller, B.: Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. In G. Davida, Y. Frankel (Eds.): Information Security-ISC'01. LNCS 2200, pp.324-334. Springer-Verlag (2001).
    • (2001) LNCS , vol.2200 , pp. 324-334
    • Möller, B.1
  • 8
    • 35248820671 scopus 로고    scopus 로고
    • Improved techniques for fast exponentiation
    • P.J. Lee, C.H. Lim (Eds.): Information Security and Cryptology-ICISC'02. Springer-Verlag
    • Möller, B.: Improved Techniques for Fast Exponentiation. In P.J. Lee, C.H. Lim (Eds.): Information Security and Cryptology-ICISC'02. LNCS 2587, pp.298-312. Springer-Verlag (2003).
    • (2003) LNCS , vol.2587 , pp. 298-312
    • Möller, B.1
  • 9
    • 35248865717 scopus 로고    scopus 로고
    • The width-w NAF method provides small memory and fast; elliptic scalar multiplications secure against side channel attacks
    • M. Joye (Ed.): Topics in Cryptology-CT-RSA'03. Springer-Verlag
    • Okeya, K., Takagi, T.: The Width-w NAF Method Provides Small Memory and Fast; Elliptic Scalar Multiplications Secure against Side Channel Attacks. In M. Joye (Ed.): Topics in Cryptology-CT-RSA'03. LNCS 2612, pp.328-342. Springer-Verlag (2003).
    • (2003) LNCS , vol.2612 , pp. 328-342
    • Okeya, K.1    Takagi, T.2
  • 10
    • 35248826949 scopus 로고    scopus 로고
    • A more flexible countermeasure against side channel attacks using window method
    • C. Walter, Ç. Koç, C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'03. Springer-Verlag
    • Okeya, K., Takagi, T.: A More Flexible Countermeasure against Side Channel Attacks Using Window Method. In C. Walter, Ç. Koç, C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'03. LNCS 2779, pp.397-410. Springer-Verlag (2003).
    • (2003) LNCS , vol.2779 , pp. 397-410
    • Okeya, K.1    Takagi, T.2
  • 11
    • 33745587326 scopus 로고    scopus 로고
    • On the exact flexibility of the flexible countermeasure against side channel attacks
    • H. Wang, J. Pieprzyk, V. Varadharajan (Eds): Information Security and Privacy-ACISP'04. Springer-Verlag
    • Okeya, K., Takagi, T., Vuillaume, C.: On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. In H. Wang, J. Pieprzyk, V. Varadharajan (Eds): Information Security and Privacy-ACISP'04. LNCS 3108, pp.466-477. Springer-Verlag (2004).
    • (2004) LNCS , vol.3108 , pp. 466-477
    • Okeya, K.1    Takagi, T.2    Vuillaume, C.3
  • 13
    • 34047117968 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • Percival, C.: Cache Missing for Fun and Profit. Technical report, available at www.daemonology.net/papers/htt.pdf
    • Technical Report
    • Percival, C.1
  • 15
    • 84944889837 scopus 로고    scopus 로고
    • MIST, an efficient, randomized exponentiation algorithm for resisting power analysis
    • B. Preenel (Ed.): Topics in Cryptology - CT-RSA'02. Springer-Verlag
    • Walter, C.: MIST, an Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. In B. Preenel (Ed.): Topics in Cryptology - CT-RSA'02. LNCS 2271, pp.53-66. Springer-Verlag (2002).
    • (2002) LNCS , vol.2271 , pp. 53-66
    • Walter, C.1
  • 16
    • 24944495384 scopus 로고    scopus 로고
    • Improvement on ha-moon randomized exponentiation algorithm
    • C. Park, S. Ghee (Eds.): Information Security and Cryptology-ICISC'04. Springer-Verlag
    • Yen, S.-M., Chen, C.-N., Moon, S.-J. , Ha, J.: Improvement on Ha-Moon Randomized Exponentiation Algorithm. In C. Park, S. Ghee (Eds.): Information Security and Cryptology-ICISC'04. LNCS 3506, pp.154-167. Springer-Verlag (2005).
    • (2005) LNCS , vol.3506 , pp. 154-167
    • Yen, S.-M.1    Chen, C.-N.2    Moon, S.-J.3    Ha, J.4
  • 17
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • IEEE Computer Society
    • Yen, S.-M., Joye, M.: Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. In IEEE Transactions on Computers, 49(9), pp.967-970. IEEE Computer Society (2000).
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.-M.1    Joye, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.