메뉴 건너뛰기




Volumn 2779, Issue , 2003, Pages 269-280

The doubling attack - Why upwards is better than downwards

Author keywords

DPA countermeasures; Modular exponentiation; Multiple exponent single data attack; Scalar multiplication; SPA based analysis

Indexed keywords

EMBEDDED SYSTEMS;

EID: 35248881073     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45238-6_22     Document Type: Article
Times cited : (166)

References (17)
  • 1
    • 84948986458 scopus 로고
    • Optimal Asymetric Encryption - How to Encrypt with RSA
    • LNCS 950, Springer-Verlag
    • M. Bellare and P. Rogaway. Optimal Asymetric Encryption - How to Encrypt with RSA. In Eurocrypt '94, LNCS 950, pages 92-111. Springer-Verlag, 1994.
    • (1994) Eurocrypt '94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 0020915882 scopus 로고
    • Blind Signatures for Untraceable Payments
    • Plenum, NY
    • D. Chaum. Blind Signatures for Untraceable Payments. In Crypto '82, pages 199-203. Plenum, NY, 1983.
    • (1983) Crypto '82 , pp. 199-203
    • Chaum, D.1
  • 3
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve
    • LNCS 1717, Springer-Verlag
    • J.S. Coron. Resistance against differential power analysis for elliptic curve. In CHES '99, LNCS 1717, pages 292-302. Springer-Verlag, 1999.
    • (1999) CHES '99 , pp. 292-302
    • Coron, J.S.1
  • 4
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • July
    • T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In IEEE Transactions on Information Theory, volume IT-31, no. 4, pages 469-472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 5
    • 35248816371 scopus 로고    scopus 로고
    • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
    • LNCS 2567, Springer-Verlag
    • L. Goubin. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. In PKC '2003, LNCS 2567, pages 199-210. Springer-Verlag, 2003.
    • (2003) PKC '2003 , pp. 199-210
    • Goubin, L.1
  • 6
    • 23944477254 scopus 로고    scopus 로고
    • Randomized signed-scalar Multiplication of ECC to resist Power Attacks
    • Springer Verlag
    • J. Ha and S. Moon. Randomized signed-scalar Multiplication of ECC to resist Power Attacks. In Pre-Proceeding CHES'02, pages 553-565. Springer Verlag, 2002.
    • (2002) Pre-Proceeding CHES'02 , pp. 553-565
    • Ha, J.1    Moon, S.2
  • 7
    • 35248835491 scopus 로고    scopus 로고
    • DPA Countermeasures by Improving the Window Method
    • Springer Verlag
    • K. Itoh, J. Yajima, M. Takenaka, and N. Torii. DPA Countermeasures by Improving the Window Method. In Pre-Proceeding CHES'02, pages 304-319. Springer Verlag, 2002.
    • (2002) Pre-Proceeding CHES'02 , pp. 304-319
    • Itoh, K.1    Yajima, J.2    Takenaka, M.3    Torii, N.4
  • 8
    • 84974665915 scopus 로고    scopus 로고
    • Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
    • LNCS 2551 Springer-Verlag
    • T. Izu, B. Moller and T. Takagi. Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. In IndoCrypt '2002, LNCS 2551, pages 296-313. Springer-Verlag, 2002.
    • (2002) IndoCrypt '2002 , pp. 296-313
    • Izu, T.1    Moller, B.2    Takagi, T.3
  • 9
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems
    • LNCS 1109, Springer-Verlag
    • P.C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems. In Crypto '96, LNCS 1109, pages 104-113. Springer-Verlag, 1996.
    • (1996) Crypto '96 , pp. 104-113
    • Kocher, P.C.1
  • 10
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • LNCS 1666, Springer-Verlag
    • P.C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Crypto '99, LNCS 1666, pages 388-397. Springer-Verlag, 1999.
    • (1999) Crypto '99 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 11
    • 0006491634 scopus 로고    scopus 로고
    • Power Analysis Attack of Modular Exponentiation in Smartcards
    • LNCS 1717. Springer-Verlag
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attack of Modular Exponentiation in Smartcards. In CHES '99, LNCS 1717. Springer-Verlag, 1999.
    • (1999) CHES '99
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 12
    • 0000266095 scopus 로고
    • Speeding up the computation on an elliptic curve using addition-substraction chains
    • F. Morain and J. Olivos. Speeding up the computation on an elliptic curve using addition-substraction chains. Inform Theory Appl., 24:531-543, 1990.
    • (1990) Inform Theory Appl. , vol.24 , pp. 531-543
    • Morain, F.1    Olivos, J.2
  • 13
    • 0003508562 scopus 로고    scopus 로고
    • Federal Information Processing Standards PUBlication 186-2, february
    • NIST. Digital Signature Standard (DSS). Federal Information Processing Standards PUBlication 186-2, february 2000.
    • (2000) Digital Signature Standard (DSS)
  • 14
    • 84945314413 scopus 로고    scopus 로고
    • A second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
    • LNCS 2433, Springer-Verlag
    • K. Okeya and K. Sakurai. A second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. In ISC '2002, LNCS 2433, pages 389-401. Springer-Verlag, 2002.
    • (2002) ISC '2002 , pp. 389-401
    • Okeya, K.1    Sakurai, K.2
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 16
    • 33646165628 scopus 로고    scopus 로고
    • A New Class of Collision Attacks and its Application to DES
    • LNCS, pages -. Springer-Verlag
    • K. Schramm, T. Wollinger, and C. Paar. A New Class of Collision Attacks and its Application to DES. In FSE '2003, LNCS, pages -. Springer-Verlag, 2003.
    • (2003) FSE '2003
    • Schramm, K.1    Wollinger, T.2    Paar, C.3
  • 17
    • 24744463146 scopus 로고    scopus 로고
    • Implementation of Elliptic Curve Cryptography with Built-in Counter Measures against Side Channel Attacks
    • Springer Verlag
    • E. Trichina and A. Bellezza. Implementation of Elliptic Curve Cryptography with Built-in Counter Measures against Side Channel Attacks. In Pre-Proceeding CHES'02, pages 98-113. Springer Verlag, 2002.
    • (2002) Pre-Proceeding CHES'02 , pp. 98-113
    • Trichina, E.1    Bellezza, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.