메뉴 건너뛰기




Volumn 4464 LNCS, Issue , 2007, Pages 225-237

How to prevent DPA and fault attack in a unified way for ECC scalar multiplication ring extension method

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; ELECTRONIC CRIME COUNTERMEASURES; FAULT TOLERANCE; MODEL CHECKING;

EID: 37149051633     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72163-5_18     Document Type: Conference Paper
Times cited : (17)

References (22)
  • 1
    • 35248871165 scopus 로고    scopus 로고
    • Zero-Value Point Attacks on Elliptic Curve Cryptosystem
    • 2851, Springer-Verlag
    • T. Akishita and T. Takagi, Zero-Value Point Attacks on Elliptic Curve Cryptosystem, ISC 2003, LNCS vol. 2851, Springer-Verlag, 2003, pp. 218-233.
    • (2003) LNCS , vol.ISC 2003 , pp. 218-233
    • Akishita, T.1    Takagi, T.2
  • 2
    • 84983134283 scopus 로고    scopus 로고
    • Differential Fault Attacks on Elliptic Curve Cryptosystems, CRYPTO 2000
    • Springer-Verlag
    • I. Biehl, B. Meyer, and V. Muller, Differential Fault Attacks on Elliptic Curve Cryptosystems, CRYPTO 2000, LNCS vol. 1880, Springer-Verlag, 2000, pp. 131-146.
    • (2000) LNCS , vol.1880 , pp. 131-146
    • Biehl, I.1    Meyer, B.2    Muller, V.3
  • 4
    • 33845275817 scopus 로고    scopus 로고
    • Sign Change Fault Attacks on Elliptic Curve Cryptosystems, FDTC 2006
    • Springer-Verlag
    • J. Blömer, M. Otto and J.-P. Seifert, Sign Change Fault Attacks on Elliptic Curve Cryptosystems, FDTC 2006, LNCS vol. 4236, Springer-Verlag, 2006, pp. 36-52.
    • (2006) LNCS , vol.4236 , pp. 36-52
    • Blömer, J.1    Otto, M.2    Seifert, J.-P.3
  • 5
    • 84957355967 scopus 로고    scopus 로고
    • D. Boneh, R.A. Demillo, and R.J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT '97, LNCS 1233, Springer-Verlag, 1997, pp. 37-51.
    • D. Boneh, R.A. Demillo, and R.J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT '97, LNCS vol. 1233, Springer-Verlag, 1997, pp. 37-51.
  • 6
    • 0142156711 scopus 로고    scopus 로고
    • M. Ciet and M. Joye, (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography, ICICS 2003, LNCS 2836, Springer-Verlag, 2003, pp. 348-359.
    • M. Ciet and M. Joye, (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography, ICICS 2003, LNCS vol. 2836, Springer-Verlag, 2003, pp. 348-359.
  • 7
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • 1717, Springer-Verlag
    • J.-S. Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, CHES 1999, LNCS vol. 1717, Springer-Verlag, 1999, pp. 292-302.
    • (1999) LNCS , vol.CHES 1999 , pp. 292-302
    • Coron, J.-S.1
  • 8
    • 35248881073 scopus 로고    scopus 로고
    • The Doubling Attack - Why Upwards Is Better Than Downwards
    • 2779, Springer-Verlag
    • P. Fouque and F. Valette, The Doubling Attack - Why Upwards Is Better Than Downwards, CHES 2003, LNCS vol. 2779, Springer-Verlag, 2003, pp. 269-280.
    • (2003) LNCS , vol.CHES 2003 , pp. 269-280
    • Fouque, P.1    Valette, F.2
  • 9
    • 35248816371 scopus 로고    scopus 로고
    • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, PKC 2003
    • Springer-Verlag
    • L. Goubin, A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, PKC 2003, LNCS vol. 2567, Springer-Verlag, 2003, pp. 199-210.
    • (2003) LNCS , vol.2567 , pp. 199-210
    • Goubin, L.1
  • 11
    • 84944901711 scopus 로고    scopus 로고
    • Protections against Differential Analysis for Elliptic Curve Cryptography - An Algebraic Approach
    • 2162, SpringerVerlag
    • M. Joye and C. Tymen, Protections against Differential Analysis for Elliptic Curve Cryptography - An Algebraic Approach, CHES 2001, LNCS vol. 2162, SpringerVerlag, 2001, pp. 377-390.
    • (2001) LNCS , vol.CHES 2001 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 12
    • 35248874869 scopus 로고    scopus 로고
    • The Montgomery Powering Ladder
    • 2523, Springer-Verlag
    • M. Joye and S.-M. Yen, The Montgomery Powering Ladder, CHES 2002, LNCS vol. 2523, Springer-Verlag, 2002, pp. 291-302.
    • (2002) LNCS , vol.CHES 2002 , pp. 291-302
    • Joye, M.1    Yen, S.-M.2
  • 13
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • N. Koblitz, Elliptic Curve Cryptosystems, Mathematics Computation, 48, 1987, pp. 203-209.
    • (1987) Mathematics Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis, CRYPTO '99
    • Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, CRYPTO '99, LNCS vol. 1666, Springer-Verlag, 1999, pp. 388-397.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 15
    • 84947913604 scopus 로고    scopus 로고
    • m) without Precomputation
    • 1717, Springer-Verlag
    • m) without Precomputation, CHES 1999, LNCS vol. 1717, Springer-Verlag, 1999, pp. 316-327.
    • (1999) LNCS , vol.CHES 1999 , pp. 316-327
    • López, J.1    Dahab, R.2
  • 16
    • 35048860937 scopus 로고    scopus 로고
    • Efficient Countermeasures Against RPA, DPA, and SPA
    • 3156, Springer-Verlag
    • H. Mamiya, A. Miyaji and H. Morimoto, Efficient Countermeasures Against RPA, DPA, and SPA, CHES 2004, LNCS vol. 3156, Springer-Verlag, 2004, pp. 343-356.
    • (2004) LNCS , vol.CHES 2004 , pp. 343-356
    • Mamiya, H.1    Miyaji, A.2    Morimoto, H.3
  • 19
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography, CRYPTO
    • 218, Springer-Verlag
    • V.S. Miller, Use of Elliptic Curves in Cryptography, CRYPTO 85, LNCS vol. 218, Springer-Verlag, 1986, pp. 417-426.
    • (1986) LNCS , vol.85 , pp. 417-426
    • Miller, V.S.1
  • 20
    • 84968484435 scopus 로고
    • Speeding the Pollard and Elliptic Curve Methods of Factorization
    • P.L. Montgomery, Speeding the Pollard and Elliptic Curve Methods of Factorization, Mathematics of Computation, 48, 1987, pp. 243-264.
    • (1987) Mathematics of Computation , vol.48 , pp. 243-264
    • Montgomery, P.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.