메뉴 건너뛰기




Volumn 2779, Issue , 2003, Pages 397-410

A more flexible countermeasure against side channel attacks using window method

Author keywords

Elliptic Curve Cryptosystem; Fractional window; Memory Constraint; Pre computation Table; Side Channel Attacks; Smart Card; Width w NAF

Indexed keywords

CRYPTOGRAPHY; EMBEDDED SYSTEMS; GEOMETRY; SMART CARDS; TRANSPORTATION;

EID: 35248826949     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45238-6_31     Document Type: Article
Times cited : (24)

References (38)
  • 1
    • 11244271401 scopus 로고    scopus 로고
    • ANSI X9.62, Public Key Cryptography for the Financial Services Industry
    • ANSI X9.62, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), (1998).
    • (1998) The Elliptic Curve Digital Signature Algorithm (ECDSA)
  • 2
    • 84958979095 scopus 로고    scopus 로고
    • Weierstrass Elliptic Curves and Side-Channel Attacks
    • Public Key Cryptography (PKC2002)
    • Brier, E., Joye, M., Weierstrass Elliptic Curves and Side-Channel Attacks, Public Key Cryptography (PKC2002), LNCS 2274, (2002), 335-345.
    • (2002) LNCS , vol.2274 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 4
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Cryptographic Hardware and Embedded Systems (CHES'99)
    • Coron, J.S., Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES'99), LNCS 1717, (1999), 292-302.
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.S.1
  • 6
    • 35248816371 scopus 로고    scopus 로고
    • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
    • Public Key Cryptography, (PKC 2003)
    • Goubin, L., A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, Public Key Cryptography, (PKC 2003), LNCS 2567, (2003), 199-211.
    • (2003) LNCS , vol.2567 , pp. 199-211
    • Goubin, L.1
  • 7
    • 35248877672 scopus 로고    scopus 로고
    • Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks
    • Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
    • Ha, J., and Moon, S., Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 551-563.
    • (2002) LNCS , vol.2523 , pp. 551-563
    • Ha, J.1    Moon, S.2
  • 8
    • 35248857338 scopus 로고    scopus 로고
    • Cryptanalysis of the Full version Randomized Addition-Subtraction Chains
    • Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu, Cryptanalysis of the Full version Randomized Addition-Subtraction Chains, to appear in ACISP 2003.
    • ACISP 2003
    • Han, D.-G.1    Chang, N.S.2    Jung, S.W.3    Park, Y.-H.4    Kim, C.H.5    Ryu, H.6
  • 9
    • 35248898400 scopus 로고    scopus 로고
    • Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA
    • Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
    • Itoh, K., Izu, T., and Takenaka, M-, Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 129-143.
    • (2002) LNCS , vol.2523 , pp. 129-143
    • Itoh, K.1    Izu, T.2    Takenaka, M.3
  • 10
    • 35248818852 scopus 로고    scopus 로고
    • DPA Countermeasures by improving the Window Method
    • Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
    • Itoh, K., Yajima, J., Takenaka, M., and Torii, N., DPA Countermeasures by improving the Window Method, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 318-332.
    • (2002) LNCS , vol.2523 , pp. 318-332
    • Itoh, K.1    Yajima, J.2    Takenaka, M.3    Torii, N.4
  • 12
    • 84958955271 scopus 로고    scopus 로고
    • A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
    • Public Key Cryptography (PKC2002)
    • Izu, T., Takagi, T., A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks, Public Key Cryptography (PKC2002), LNCS 2274, (2002), 280-296.
    • (2002) LNCS , vol.2274 , pp. 280-296
    • Izu, T.1    Takagi, T.2
  • 13
    • 84944884283 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • Cryptographic Hardware and Embedded Systems (CHES'01)
    • Joye, M., Quisquater, J.J., Hessian elliptic curves and side-channel attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS 2162, (2001), 402-410.
    • (2001) LNCS , vol.2162 , pp. 402-410
    • Joye, M.1    Quisquater, J.J.2
  • 14
    • 84944901711 scopus 로고    scopus 로고
    • Protections against differential analysis for elliptic curve cryptography: An algebraic approach
    • Cryptographic Hardware and Embedded Systems (CHES'01)
    • Joye, M., Tymen, C., Protections against differential analysis for elliptic curve cryptography: An algebraic approach, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 377-390.
    • (2001) LNCS , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 15
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N., Elliptic curve cryptosystems, Math. Comp. 48, (1987), 203-209.
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 16
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Advances in Cryptology - CRYPTO '99
    • Kocher, C., Jaffe, J., Jun, B., Differential Power Analysis, Advances in Cryptology - CRYPTO '99, LNCS 1666, (1999), 388-397.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, C.1    Jaffe, J.2    Jun, B.3
  • 17
    • 84957354181 scopus 로고
    • Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method
    • Advances in Cryptology - CRYPTO '92
    • K. Koyama and Y. Tsuruoka, Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method, Advances in Cryptology - CRYPTO '92, LNCS 740, (1992), 345-357.
    • (1992) LNCS , vol.740 , pp. 345-357
    • Koyama, K.1    Tsuruoka, Y.2
  • 18
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the Jacobi form
    • Cryptographic Hardware and Embedded System (CHES'01)
    • Liardet, P.Y., Smart, N.P., Preventing SPA/DPA in ECC systems using the Jacobi form, Cryptographic Hardware and Embedded System (CHES'01), LNCS2162, (2001), 391-401.
    • (2001) LNCS , vol.2162 , pp. 391-401
    • Liardet, P.Y.1    Smart, N.P.2
  • 19
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Advances in Cryptology - CRYPTO '85
    • Miller, V.S., Use of elliptic curves in cryptography, Advances in Cryptology - CRYPTO '85, LNCS218, (1986), 417-426.
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 21
    • 84947262754 scopus 로고    scopus 로고
    • Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
    • Information Security (ISC2001)
    • Möller, B., Securing Elliptic Curve Point Multiplication against Side-Channel Attacks, Information Security (ISC2001), LNCS2200, (2001), 324-334.
    • (2001) LNCS , vol.2200 , pp. 324-334
    • Möller, B.1
  • 23
    • 84945249400 scopus 로고    scopus 로고
    • Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
    • Information Security Conference (ISC 2002)
    • Möller, B., Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 402-413.
    • (2002) LNCS , vol.2433 , pp. 402-413
    • Möller, B.1
  • 24
    • 35248820671 scopus 로고    scopus 로고
    • Improved Techniques for Fast Exponentiation
    • The 5th International Conference on Information Security and Cryptology (ICISC 2002)
    • Möller, B., Improved Techniques for Fast Exponentiation, The 5th International Conference on Information Security and Cryptology (ICISC 2002), LNCS 2587, (2003), 298-312.
    • (2003) LNCS , vol.2587 , pp. 298-312
    • Möller, B.1
  • 25
    • 35248816353 scopus 로고    scopus 로고
    • FIPS 186-2
    • National Institute of Standards and Technology, FIPS 186-2, http://csrc.nist.gov/publication/fips/fips186-2/fips186-2.pdf
  • 26
    • 84944889933 scopus 로고    scopus 로고
    • Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
    • Cryptographic Hardware and Embedded Systems (CHES'01)
    • Oswald, E., Aigner, M., Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 39-50.
    • (2001) LNCS , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 27
    • 84947733936 scopus 로고    scopus 로고
    • Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
    • Progress in Cryptology - INDOCRYPT 2000
    • Okeya, K., Sakurai, K., Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack, Progress in Cryptology - INDOCRYPT 2000, LNCS1977, (2000), 178-190.
    • (2000) LNCS , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 28
    • 84947425601 scopus 로고    scopus 로고
    • On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability be-tween Addition and Doubling
    • The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002)
    • Okeya, K., Sakurai, K., On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability be-tween Addition and Doubling, The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002), LNCS2384, (2002), 420-435.
    • (2002) LNCS , vol.2384 , pp. 420-435
    • Okeya, K.1    Sakurai, K.2
  • 29
    • 84945314413 scopus 로고    scopus 로고
    • A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks
    • Information Security Conference (ISC 2002)
    • Okeya, K., Sakurai, K., A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 389-401.
    • (2002) LNCS , vol.2433 , pp. 389-401
    • Okeya, K.1    Sakurai, K.2
  • 30
    • 84939214123 scopus 로고    scopus 로고
    • A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks
    • these proceedings
    • Okeya, K., Sakurai, K., A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks, in 2003 IEEE Information Theory Workshop (ITW 2003) (these proceedings), (2003).
    • (2003) 2003 IEEE Information Theory Workshop (ITW 2003)
    • Okeya, K.1    Sakurai, K.2
  • 31
    • 35248821853 scopus 로고    scopus 로고
    • Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
    • Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
    • Oswald, E., Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 82-97.
    • (2002) LNCS , vol.2523 , pp. 82-97
    • Oswald, E.1
  • 32
    • 35248865717 scopus 로고    scopus 로고
    • The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks
    • Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003)
    • Okeya, K., Takagi, T., The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks, Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003), LNCS2612, (2003), 328-342.
    • (2003) LNCS , vol.2612 , pp. 328-342
    • Okeya, K.1    Takagi, T.2
  • 33
    • 35248889353 scopus 로고    scopus 로고
    • Standards for Efficient Cryptography Group (SECG), http://www.secg.org
  • 34
    • 0010029876 scopus 로고    scopus 로고
    • Efficient Arithmetic on Koblitz Curves
    • Solinas, J.A., Efficient Arithmetic on Koblitz Curves, Design, Codes and Cryptography, 19, (2000), 195-249.
    • (2000) Design, Codes and Cryptography , vol.19 , pp. 195-249
    • Solinas, J.A.1
  • 35
    • 0038123605 scopus 로고    scopus 로고
    • Some Security Aspects of the Mist Randomized Exponentiation Algorithm
    • Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
    • Walter, C.D., Some Security Aspects of the Mist Randomized Exponentiation Algorithm, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 564-578.
    • (2002) LNCS , vol.2523 , pp. 564-578
    • Walter, C.D.1
  • 36
    • 0842283870 scopus 로고    scopus 로고
    • Breaking the Liardet-Smart Randomized Exponentiation Algorithm
    • USENIX Assoc
    • Walter, C.D., Breaking the Liardet-Smart Randomized Exponentiation Algorithm, Proceedings of CARDIS'02, USENIX Assoc, (2002), 59-68.
    • (2002) Proceedings of CARDIS'02 , pp. 59-68
    • Walter, C.D.1
  • 37
    • 33645596424 scopus 로고    scopus 로고
    • International Association for Cryptologic Research (IACR), Cryptology ePrint Archive 2003/013
    • Walter, C.D., Security Constraints on the Oswald-Aigner Exponentiation Algorithm, International Association for Cryptologic Research (IACR), Cryptology ePrint Archive 2003/013, (2003). http://eprint.iacr.org/2003/013/
    • (2003) Security Constraints on the Oswald-Aigner Exponentiation Algorithm
    • Walter, C.D.1
  • 38
    • 35048848043 scopus 로고    scopus 로고
    • Seeing through Mist Given a Small Fraction of an RSA Private Key, Topics in Cryptology
    • Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003)
    • Walter, C.D., Seeing through Mist Given a Small Fraction of an RSA Private Key, Topics in Cryptology, Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003), LNCS2612, (2003), 391-402.
    • (2003) LNCS , vol.2612 , pp. 391-402
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.