메뉴 건너뛰기




Volumn 2523, Issue , 2003, Pages 303-317

DPA Countermeasures by Improving the Window Method

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; HARDWARE; PUBLIC KEY CRYPTOGRAPHY; SIDE CHANNEL ATTACK;

EID: 35248818852     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36400-5_23     Document Type: Article
Times cited : (35)

References (10)
  • 1
    • 84944905303 scopus 로고    scopus 로고
    • Universal Exponentiation Algorithm - A First Step Towards Provable SPA Resistance", CHES 2001
    • Springer-Verlag
    • Christophe Clavier and Marc Joye, "Universal Exponentiation Algorithm - A First Step Towards Provable SPA Resistance", CHES 2001, LNCS 2162, pp. 300-308, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 300-308
    • Clavier, C.1    Joye, M.2
  • 2
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • CHES'99 Springer-Verlag, 99
    • Jean-Sébastien Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems", CHES'99, LNCS 1717, pp. 292-302, Springer-Verlag, 99.
    • LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 3
    • 84944901711 scopus 로고    scopus 로고
    • "Protections against Differential Analysis for Elliptic Curve Cryptography"
    • CHES 2001, Springer-Verlag
    • Marc Joye and Christophe Tymen, "Protections against Differential Analysis for Elliptic Curve Cryptography", CHES 2001, LNCS 2162, pp. 377-390, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 7
    • 84949514743 scopus 로고    scopus 로고
    • Power Analysis Attacks of Modular Exponentiation in Smartcards
    • Cryptographic Hardware and Embedded Systems, CHES'99
    • Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards.", Cryptographic Hardware and Embedded Systems, CHES'99, LNCS 1717, pp. 144-157.
    • LNCS , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 8
    • 84947262754 scopus 로고    scopus 로고
    • Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
    • Bodo Moller, "Securing Elliptic Curve Point Multiplication against Side-Channel Attacks", Information Security-ISC 2001, pp. 324-334.
    • (2001) Information Security-ISC , pp. 324-334
    • Moller, B.1
  • 9
    • 84949949652 scopus 로고    scopus 로고
    • A fast scalar multiplication method with randomized coordinates on a Montgomery-form elliptic curve secure against side channel attacks"
    • Springer-Verlag
    • K. Okeya, K. Miyazaki and K. Sakurai, "A fast scalar multiplication method with randomized coordinates on a Montgomery-form elliptic curve secure against side channel attacks", ICISC 2001, LNCS 2288, pp. 428-439, Springer-Verlag, 2001.
    • (2001) ICISC 2001, LNCS 2288 , pp. 428-439
    • Okeya, K.1    Miyazaki, K.2    Sakurai, K.3
  • 10
    • 84944889933 scopus 로고    scopus 로고
    • Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
    • HES
    • Elisabeth Oswald and Manfred Aigner, "Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks", Cryptographic Hardware and Embedded Systems, CHES 2001, pp. 39-50.
    • (2001) Cryptographic Hardware and Embedded Systems, C , pp. 39-50
    • Oswald, E.1    Aigner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.