메뉴 건너뛰기




Volumn 3156, Issue , 2004, Pages 191-204

Simple power analysis of unified code for ECC double and add

Author keywords

ECC; Elliptic curve cryptography; Montgomery modular multiplication; Side channel leakage; Simple power analysis; SPA; Unified code

Indexed keywords

CODES (SYMBOLS); CRYPTOGRAPHY; EMBEDDED SYSTEMS; GEOMETRY; PUBLIC KEY CRYPTOGRAPHY;

EID: 35048841251     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-28632-5_14     Document Type: Article
Times cited : (34)

References (20)
  • 1
    • 35048886727 scopus 로고    scopus 로고
    • Portable Data Carrier Including A Microprocessor, Patent no. 4211919 (Abstract), US Patent and Trademark Office, July 8, 1980
    • Portable data carrier including a microprocessor, Patent no. 4211919 (Abstract), US Patent and Trademark Office, July 8, 1980.
  • 2
    • 0003508562 scopus 로고    scopus 로고
    • FIPS PUB 186-2 (Appendix 6), U. S. National Institute of Standards and Technology, 27 Jan
    • Digital Signature Standard (DSS), FIPS PUB 186-2 (Appendix 6), U. S. National Institute of Standards and Technology, 27 Jan 2000.
    • (2000) Digital Signature Standard (DSS)
  • 3
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraß Elliptic Curves and Side-Channel Attacks
    • Public Key Cryptography (Proc. PKC 2002), D. Naccache & P. Paillier (editors), Springer-Verlag
    • E. Brier & M. Joye, Weierstraß Elliptic Curves and Side-Channel Attacks, Public Key Cryptography (Proc. PKC 2002), D. Naccache & P. Paillier (editors), LNCS 2274, Springer-Verlag, 2002, pp. 335-345.
    • (2002) LNCS , vol.2274 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 4
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Cryptographic Hardware and Embedded Systems (Proc. CHES 99), G. Paar & Ç. Koç (editors), Springer-Verlag
    • J. -S. Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (Proc. CHES 99), G. Paar & Ç. Koç (editors), LNCS 1717, Springer-Verlag, 1999, pp. 292-302.
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.S.1
  • 5
    • 84954462346 scopus 로고    scopus 로고
    • A practical implementation of the Timing Attack
    • Proc. CARDIS 1998, J. -J. Quisquater & B. Schneier (editors), Springer-Verlag
    • J. -F. Dhem, F. Koeune, P. -A. Leroux, P. Mestré, J. -J. Quisquater & J. -L. Willems, A practical implementation of the Timing Attack, Proc. CARDIS 1998, J. -J. Quisquater & B. Schneier (editors), LNCS 1820, Springer-Verlag, 2000, pp. 175-190.
    • (2000) LNCS , vol.1820 , pp. 175-190
    • Dhem, J.F.1    Koeune, F.2    Leroux, P.A.3    Mestré, P.4    Quisquater, J.J.5    Willems, J.L.6
  • 6
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • K. Gandolfi, C. Mourtel & F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 251-261.
    • (2001) LNCS , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 7
    • 35248815162 scopus 로고    scopus 로고
    • Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor
    • Cryptographic Hardware and Embedded Systems - CHES 2002, B. Kaliski, Ç. Koç & C. Paar (editors), Springer-Verlag
    • C. Gebotys & R. Gebotys, Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor, Cryptographic Hardware and Embedded Systems - CHES 2002, B. Kaliski, Ç. Koç & C. Paar (editors), LNCS 2523, Springer-Verlag, 2003, pp. 114-128.
    • (2003) LNCS , vol.2523 , pp. 114-128
    • Gebotys, C.1    Gebotys, R.2
  • 8
    • 84944884283 scopus 로고    scopus 로고
    • Hessian Elliptic Curves and Side. Channel Attacks
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • M. Joye &: J. -J. Quisquater, Hessian Elliptic Curves and Side. Channel Attacks, Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 402-410.
    • (2001) LNCS , vol.2162 , pp. 402-410
    • Joye, M.1    Quisquater, J.J.2
  • 9
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation 48, 1987, pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 10
    • 84943632039 scopus 로고    scopus 로고
    • Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Advances in Cryptology - CRYPTO '96, N. Koblitz (editor), Springer-Verlag
    • P. Kocher, Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology - CRYPTO '96, N. Koblitz (editor), LNCS 1109, Springer-Verlag, 1996, pp. 104-113.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 11
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Advances in Cryptology - CRYPTO '99, M. Wiener (editor), Springer-Verlag
    • P. Kocher, J. Jaffe & B. Jun, Differential Power Analysis, Advances in Cryptology - CRYPTO '99, M. Wiener (editor), LNCS 1666, Springer-Verlag, 1999, pp. 388-397.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 12
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC Systems using the Jacobi Form
    • Cryptographic Hardware and Embedded Systems - CUES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • P. -Y. Liardet & N. P. Smart, Preventing SPA/DPA in ECC Systems using the Jacobi Form, Cryptographic Hardware and Embedded Systems - CUES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 391-401.
    • (2001) LNCS , vol.2162 , pp. 391-401
    • Liardet, P.Y.1    Smart, N.P.2
  • 13
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • Advances in Cryptology -CRYPTO '85, H. C. Williams (editor), Springer-Verlag
    • V. Miller, Use of Elliptic Curves in Cryptography, Advances in Cryptology -CRYPTO '85, H. C. Williams (editor), LNCS 218, Springer-Verlag, 1986, pp. 417-426.
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.1
  • 14
    • 84966243285 scopus 로고
    • Modular Multiplication without Trial Division
    • P. L. Montgomery, Modular Multiplication without Trial Division, Mathematics of Computation 44, no. 170, 1985, pp. 519-521.
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 15
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
    • Smart Card Programming and Security (Proc. e-Smart 2001), I. Attali & T. Jensen (editors), Springer-Verlag
    • J. -J. Quisquater &: D. Samyde, ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards, Smart Card Programming and Security (Proc. e-Smart 2001), I. Attali & T. Jensen (editors), LNCS 2140, Springer-Verlag, 2001, pp. 200-210.
    • (2001) LNCS , vol.2140 , pp. 200-210
    • Quisquater, J.J.1    Samyde, D.2
  • 16
    • 84958960266 scopus 로고    scopus 로고
    • A Combined Timing and Power Attack
    • Public Key Cryptography (Proc. PKC 2002), P. Paillier & D. Naccache (editors), Springer-Verlag
    • W. Schindler, A Combined Timing and Power Attack, Public Key Cryptography (Proc. PKC 2002), P. Paillier & D. Naccache (editors), LNCS 2274, Springer-Verlag, 2002, pp. 263-279.
    • (2002) LNCS , vol.2274 , pp. 263-279
    • Schindler, W.1
  • 17
    • 33645591077 scopus 로고    scopus 로고
    • More detail for a Combined Timing and Power Attack against Implementations of RSA
    • Cryptography and Coding, K. G. Paterson (editor), Springer-Verlag
    • W. Schindler & C. D. Walter, More detail for a Combined Timing and Power Attack against Implementations of RSA, Cryptography and Coding, K. G. Paterson (editor), LNCS 2898, Springer-Verlag, 2003, pp. 245-263.
    • (2003) LNCS , vol.2898 , pp. 245-263
    • Schindler, W.1    Walter, C.D.2
  • 18
    • 84944900219 scopus 로고    scopus 로고
    • Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli
    • Topics in Cryptology - CT-RSA 2002, B. Preneel (editor), Springer-Verlag
    • C. D. Walter, Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli, Topics in Cryptology - CT-RSA 2002, B. Preneel (editor), LNCS 2271, Springer-Verlag, 2002, pp. 30-39.
    • (2002) LNCS , vol.2271 , pp. 30-39
    • Walter, C.D.1
  • 19
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing Exponent Digits by Observing Modular Subtractions
    • Topics in Cryptology - CT-RSA 2001, D. Naccache (editor), Springer-Verlag
    • C. D. Walter & S. Thompson, Distinguishing Exponent Digits by Observing Modular Subtractions, Topics in Cryptology - CT-RSA 2001, D. Naccache (editor), LNCS 2020, Springer-Verlag, 2001, pp. 192-207.
    • (2001) LNCS , vol.2020 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2
  • 20
    • 84944888189 scopus 로고    scopus 로고
    • Sliding Windows succumbs to Big Mac Attack
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • C. D. Walter, Sliding Windows succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 286-299.
    • (2001) LNCS , vol.2162 , pp. 286-299
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.