메뉴 건너뛰기




Volumn II, Issue , 2005, Pages 1879-1883

Electromagnetic analysis attack on an FPGA implementation of an elliptic curve cryptosystem

Author keywords

DEMA; Elliptic curve cryptosys terns; SEMA; Side channel attacks

Indexed keywords

ALGORITHMS; CORRELATION METHODS; CRYPTOGRAPHY; ELECTROMAGNETISM; INTEGRATED CIRCUITS;

EID: 33947318808     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/eurcon.2005.1630348     Document Type: Conference Paper
Times cited : (82)

References (23)
  • 1
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
    • Advances in Cryptology: Proceedings of CRYPTO'96, N. Koblitz, Ed, of, Springer-Verlag
    • P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems," in Advances in Cryptology: Proceedings of CRYPTO'96, N. Koblitz, Ed., 1996, vol. 1109 of LNCS, pp. 104-113, Springer-Verlag.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 2
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Advances in Cryptology: Proceedings of CRYPTO'99, M. Wiener, Ed, of, Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology: Proceedings of CRYPTO'99, M. Wiener, Ed., 1999, vol. 1666 of LNCS, pp. 388-397, Springer-Verlag.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 3
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Advances in Cryptology: Proceedings of CRYPTO'85, H. C. Williams, Ed, of, Springer-Verlag
    • V. Miller, "Uses of elliptic curves in cryptography," in Advances in Cryptology: Proceedings of CRYPTO'85, H. C. Williams, Ed., 1985, vol. 218 of LNCS, pp. 417-426, Springer-Verlag.
    • (1985) LNCS , vol.218 , pp. 417-426
    • Miller, V.1
  • 4
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • N. Koblitz, "Elliptic curve cryptosystem," Math. Comp., vol. 48, pp. 203-209, 1987.
    • (1987) Math. Comp , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 7
    • 0003922284 scopus 로고    scopus 로고
    • Physics for scientists and engineers
    • Saunders college publishing
    • R. A. Serway, Physics for scientists and engineers, Saunders Golden sunburst series. Saunders college publishing, 1996.
    • (1996) Saunders Golden sunburst series
    • Serway, R.A.1
  • 10
    • 85027120341 scopus 로고    scopus 로고
    • NSA
    • NSA, "NSA TEMPEST Documents," http://www.cryptome.org/nsa- tempest.htm.
    • NSA TEMPEST Documents
  • 11
    • 78650238574 scopus 로고    scopus 로고
    • Electromagnetic analysis (EMA): Measures and counter-measures for smard cards
    • Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security E-smart, I. Attali and T. Jensen, Eds, of, Springer-Verlag
    • J.-J. Quisquater and D. Samyde, "Electromagnetic analysis (EMA): Measures and counter-measures for smard cards," in Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security (E-smart), I. Attali and T. Jensen, Eds., 2001, vol. 2140 of LNCS, pp. 200-210, Springer-Verlag.
    • (2001) LNCS , vol.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 12
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems CHES, Ç. K. Koc, D. Naccache, and C. Paar, Eds, of, Springer-Verlag
    • K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Ç. K. Koc, D. Naccache, and C. Paar, Eds., 2001, vol. 2162 of LNCS, pp. 255-265, Springer-Verlag.
    • (2001) LNCS , vol.2162 , pp. 255-265
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 13
    • 35248817849 scopus 로고    scopus 로고
    • The EM side-channel(s): Attacks and assessment methodologies
    • Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems CHES, B. S. Kaliski Jr, Ç. K. Koç, and C. Paar, Eds, of, Springer-Verlag
    • D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, "The EM side-channel(s): Attacks and assessment methodologies," in Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, Eds., 2002, vol. 2523 of LNCS, pp. 29-45, Springer-Verlag.
    • (2002) LNCS , vol.2523 , pp. 29-45
    • Agrawal, D.1    Archambeault, B.2    Rao, J.R.3    Rohatgi, P.4
  • 15
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems CHES, B. S. Kaliski Jr, Ç. K. Koç, and C. Paar, Eds, of, Springer-Verlag
    • S. Chari, J. R. Rao, and P. Rohatgi, "Template attacks," in Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, Eds., 2002, vol. 2523 of LNCS, pp. 172-186, Springer-Verlag.
    • (2002) LNCS , vol.2523 , pp. 172-186
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 16
    • 35248896294 scopus 로고    scopus 로고
    • Multi-channel attacks
    • Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems CHES, C. Walter, Ç. K. Koç, and C. Paar, Eds, of, Springer-Verlag
    • D. Agrawal, J. R. Rao, and P. Rohatgi, "Multi-channel attacks," in Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), C. Walter, Ç. K. Koç, and C. Paar, Eds., 2003, vol. 2779 of LNCS, pp. 2-16, Springer-Verlag.
    • (2003) LNCS , vol.2779 , pp. 2-16
    • Agrawal, D.1    Rao, J.R.2    Rohatgi, P.3
  • 17
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing exponent digits by observing modular subtractions
    • Proceedings of Topics in Cryptology, CT-RSA, D. Naccache, Ed, of, Springer-Verlag
    • C. D. Walter and S. Thompson, "Distinguishing exponent digits by observing modular subtractions," in Proceedings of Topics in Cryptology - CT-RSA, D. Naccache, Ed., 2001, vol. 2020 of LNCS, pp. 192-207, Springer-Verlag.
    • (2001) LNCS , vol.2020 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2
  • 18
    • 33947311714 scopus 로고    scopus 로고
    • Exploiting radiated emissions - EM attacks on cryptographic ICs
    • S. Mangard, "Exploiting radiated emissions - EM attacks on cryptographic ICs," in Proceedings of Austrochip, 2003.
    • (2003) Proceedings of Austrochip
    • Mangard, S.1
  • 20
    • 35248847436 scopus 로고    scopus 로고
    • Power-analysis attacks on an FPGA - first experimental results
    • Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems CHES, C. Walter, Ç. K. Koç, and C. Paar, Eds, of, Springer-Verlag
    • S. B. Örs, E. Oswald, and B. Preneel, "Power-analysis attacks on an FPGA - first experimental results," in Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), C. Walter, Ç. K. Koç, and C. Paar, Eds., 2003, vol. 2779 of LNCS, pp. 35-50, Springer-Verlag.
    • (2003) LNCS , vol.2779 , pp. 35-50
    • Örs, S.B.1    Oswald, E.2    Preneel, B.3
  • 21
    • 33947310972 scopus 로고    scopus 로고
    • P. Buysschaert and E. De Mulder, Elektromagnetische analyse (EMA) van een FPGA implementatie van een elliptische krommen cryptosysteem, M.S. thesis, K.U.Leuven, Departement Elektrotechniek - ESAT, Kasteelpark Arenberg 10, B 3001 Heverlee, Belgium, May 2004.
    • P. Buysschaert and E. De Mulder, "Elektromagnetische analyse (EMA) van een FPGA implementatie van een elliptische krommen cryptosysteem," M.S. thesis, K.U.Leuven, Departement Elektrotechniek - ESAT, Kasteelpark Arenberg 10, B 3001 Heverlee, Belgium, May 2004.
  • 22
    • 33947310796 scopus 로고    scopus 로고
    • Hardware implementation of an elliptic curve processor over GF(p) with montgomery modular multiplier
    • February
    • S. B. Örs, L. Batina, B. Preneel, and J. Vandewalle, "Hardware implementation of an elliptic curve processor over GF(p) with montgomery modular multiplier," International Journal of Embedded Systems, February 2005.
    • (2005) International Journal of Embedded Systems
    • Örs, S.B.1    Batina, L.2    Preneel, B.3    Vandewalle, J.4
  • 23
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Proceedings of the 1st International Workshop on Cryptographic Hardware and Embedded Systems CHES, Ç. K. Koç and C. Paar, Eds, of, Springer-Verlag
    • J.-S. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," in Proceedings of the 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Ç. K. Koç and C. Paar, Eds., 1999, vol. 1717 of LNCS, pp. 292-302, Springer-Verlag.
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.