메뉴 건너뛰기




Volumn 2612, Issue , 2003, Pages 328-342

The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks

Author keywords

Elliptic curve cryptosystem; Memory constraint; Pre computation table; Side channel attacks; Smart card; Width w NAF

Indexed keywords

CHAINS; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; ECONOMIC AND SOCIAL EFFECTS; EFFICIENCY; SMART CARDS;

EID: 35248865717     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36563-x_23     Document Type: Article
Times cited : (75)

References (38)
  • 1
    • 0003735741 scopus 로고    scopus 로고
    • ANSI X9.62, Public Key Cryptography for the Financial Services Industry
    • ANSI X9.62, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), (1999).
    • (1999) The Elliptic Curve Digital Signature Algorithm (ECDSA)
  • 2
    • 84958979095 scopus 로고    scopus 로고
    • Weierstrass Elliptic Curves and Side-Channel Attacks
    • Public Key Cryptography (PKC2002)
    • Brier, É., Joye, M., Weierstrass Elliptic Curves and Side-Channel Attacks, Public Key Cryptography (PKC2002), LNCS2274, (2002), 335-345.
    • (2002) LNCS , vol.2274 , pp. 335-345
    • Brier, É.1    Joye, M.2
  • 4
    • 84947743704 scopus 로고    scopus 로고
    • Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
    • Advances in Cryptology - ASIACRYPT '98
    • Cohen, H., Miyaji, A., Ono, T., Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, Advances in Cryptology - ASIACRYPT '98, LNCS1514, (1998), 51-65.
    • (1998) LNCS , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 5
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Cryptographic Hardware and Embedded Systems (CHES'99)
    • Coron, J. S., Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES'99), LNCS1717, (1999), 292-302.
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.S.1
  • 8
    • 84947425200 scopus 로고    scopus 로고
    • A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
    • Information Security and Privacy, 7th Australasian Conference, (ACISP 2002)
    • Hitchcock, Y., Montague, P., A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis, Information Security and Privacy, 7th Australasian Conference, (ACISP 2002), LNCS2384, (2002), 214-225.
    • (2002) LNCS , vol.2384 , pp. 214-225
    • Hitchcock, Y.1    Montague, P.2
  • 12
    • 84958955271 scopus 로고    scopus 로고
    • A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
    • Public Key Cryptography (PKC2002)
    • Izu, T., Takagi, T., A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks, Public Key Cryptography (PKC2002), LNCS2274, (2002), 280-296.
    • (2002) LNCS , vol.2274 , pp. 280-296
    • Izu, T.1    Takagi, T.2
  • 13
    • 84944884283 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • Cryptographic Hardware and Embedded Systems (CHES'01)
    • Joye, M., Quisquater, J. J., Hessian elliptic curves and side-channel attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 402-410.
    • (2001) LNCS , vol.2162 , pp. 402-410
    • Joye, M.1    Quisquater, J.J.2
  • 14
    • 84937395009 scopus 로고    scopus 로고
    • Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography
    • Public Key Cryptography 2001 (PKC2001)
    • Joye, M., Tymen, C., Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography, Public Key Cryptography 2001 (PKC2001), pp.353-364, LNCS 1992, 2001.
    • (2001) LNCS , vol.1992 , pp. 353-364
    • Joye, M.1    Tymen, C.2
  • 15
    • 84944901711 scopus 로고    scopus 로고
    • Protections against differential analysis for elliptic curve cryptography: An algebraic approach
    • Cryptographic Hardware and Embedded Systems (CHES'01)
    • Joye, M., Tymen, C., Protections against differential analysis for elliptic curve cryptography: An algebraic approach, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 377-390.
    • (2001) LNCS , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 16
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N., Elliptic curve cryptosystems, Math. Comp. 48, (1987), 203-209.
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 17
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • Kocher, C., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology - CRYPTO '96, LNCS1109, (1996), 104-113.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, C.1
  • 18
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Advances in Cryptology - CRYPTO '99
    • Kocher, C., Jaffe, J., Jun, B., Differential Power Analysis, Advances in Cryptology - CRYPTO '99, LNCS1666, (1999), 388-397.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, C.1    Jaffe, J.2    Jun, B.3
  • 19
    • 84957354181 scopus 로고
    • Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method
    • Advances in Cryptology - CRYPTO '92
    • K. Koyama and Y. Tsuruoka, Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method, Advances in Cryptology - CRYPTO '92, LNCS740, (1992), pp.345-357.
    • (1992) LNCS , vol.740 , pp. 345-357
    • Koyama, K.1    Tsuruoka, Y.2
  • 20
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the Jacobi form
    • Cryptographic Hardware and Embedded System (CHES'01)
    • Liardet, P. Y., Smart, N. P., Preventing SPA/DPA in ECC systems using the Jacobi form, Cryptographic Hardware and Embedded System (CHES'01), LNCS2162, (2001), 391-401.
    • (2001) LNCS , vol.2162 , pp. 391-401
    • Liardet, P.Y.1    Smart, N.P.2
  • 21
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Advances in Cryptology - CRYPTO '85
    • Miller, V. S., Use of elliptic curves in cryptography, Advances in Cryptology - CRYPTO '85, LNCS218,(1986), pp.417-426.
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 23
    • 84947262754 scopus 로고    scopus 로고
    • Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
    • Information Security (ISC2001)
    • Möller, B., Securing Elliptic Curve Point Multiplication against Side-Channel Attacks, Information Security (ISC2001), LNCS2200, (2001), 324-334.
    • (2001) LNCS , vol.2200 , pp. 324-334
    • Möller, B.1
  • 25
    • 84945249400 scopus 로고    scopus 로고
    • Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
    • Information Security Conference (ISC 2002)
    • Möller, B., Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 402-413.
    • (2002) LNCS , vol.2433 , pp. 402-413
    • Möller, B.1
  • 26
    • 35248856798 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, FIPS 186-2, http://csrc.nist.gov/publication/fips/fips186-2/fips186-2.pdf
    • FIPS 186-2
  • 27
    • 84944889933 scopus 로고    scopus 로고
    • Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
    • Cryptographic Hardware and Embedded Systems (CHES'01)
    • Oswald, E., Aigner, M., Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 39-50.
    • (2001) LNCS , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 28
    • 84949949652 scopus 로고    scopus 로고
    • A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks
    • The 4th International Conference on Information Security and Cryptology (ICISC 2001)
    • Okeya, K., Miyazaki, K., Sakurai, K., A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks, The 4th International Conference on Information Security and Cryptology (ICISC 2001), LNCS2288, (2002), 428-439.
    • (2002) LNCS , vol.2288 , pp. 428-439
    • Okeya, K.1    Miyazaki, K.2    Sakurai, K.3
  • 29
    • 84947733936 scopus 로고    scopus 로고
    • Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
    • Progress in Cryptology - INDOCRYPT 2000
    • Okeya, K., Sakurai, K., Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack, Progress in Cryptology - INDOCRYPT 2000, LNCS1977, (2000), 178-190.
    • (2000) LNCS , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 30
    • 84947425601 scopus 로고    scopus 로고
    • On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
    • The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002)
    • Okeya, K., Sakurai, K., On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling, The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002), LNCS2384, (2002), 420-435.
    • (2002) LNCS , vol.2384 , pp. 420-435
    • Okeya, K.1    Sakurai, K.2
  • 31
    • 35248872362 scopus 로고    scopus 로고
    • Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick
    • Okeya, K., Sakurai, K., Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick, Cryptographic Hardware and Embedded System (CHES 2002), Pre-Proceedings, (2002), 566-581.
    • (2002) Cryptographic Hardware and Embedded System (CHES 2002), Pre-Proceedings , pp. 566-581
    • Okeya, K.1    Sakurai, K.2
  • 32
    • 84945314413 scopus 로고    scopus 로고
    • A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks
    • Information Security Conference (ISC 2002)
    • Okeya, K., Sakurai, K., A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 389-401.
    • (2002) LNCS , vol.2433 , pp. 389-401
    • Okeya, K.1    Sakurai, K.2
  • 34
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol.21, No.2, (1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 35
    • 35248894236 scopus 로고    scopus 로고
    • Standards for Efficient Cryptography Group (SECG), http://www.secg.org
  • 36
    • 0010029876 scopus 로고    scopus 로고
    • Efficient Arithmetic on Koblitz Curves
    • Solinas, J. A., Efficient Arithmetic on Koblitz Curves, Design, Codes and Cryptography, 19, (2000), 195-249.
    • (2000) Design, Codes and Cryptography , vol.19 , pp. 195-249
    • Solinas, J.A.1
  • 38
    • 0842283870 scopus 로고    scopus 로고
    • Breaking the Liardet-Smart Randomized Exponentiation Algorithm
    • Walter, C. D., Breaking the Liardet-Smart Randomized Exponentiation Algorithm, to apper in CARDIS'02.
    • CARDIS'02
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.