메뉴 건너뛰기




Volumn 4867 LNCS, Issue , 2007, Pages 333-344

Provably secure countermeasure resistant to several types of power attack for ECC

Author keywords

ECC; Power analysis attack; Side channel attack; Smart card

Indexed keywords

BINARY SEQUENCES; BLIND EQUALIZATION; CRYPTOGRAPHY; RADIO FREQUENCY IDENTIFICATION (RFID); SMART CARDS;

EID: 38549181150     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77535-5_24     Document Type: Conference Paper
Times cited : (10)

References (19)
  • 1
    • 84944905303 scopus 로고    scopus 로고
    • Clavier, C., Joye, M.: Universal exponentiation algorithm. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 300-308. Springer, Heidelberg (2001)
    • Clavier, C., Joye, M.: Universal exponentiation algorithm. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 300-308. Springer, Heidelberg (2001)
  • 2
    • 33750833266 scopus 로고    scopus 로고
    • A secure and practical CRT-based RSA to resist side channel attacks
    • Lagana, A, Gavrilova, M, Kumar, V, Mun, Y, Tan, C.J.K, Gervasi, O, eds, ICCSA 2004, Springer, Heidelberg
    • Kim, C., Ha, J., Kim, S., Kim, S., Yen, S., Moon, S.: A secure and practical CRT-based RSA to resist side channel attacks. In: Lagana, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 150-158. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3043 , pp. 150-158
    • Kim, C.1    Ha, J.2    Kim, S.3    Kim, S.4    Yen, S.5    Moon, S.6
  • 3
    • 33745818850 scopus 로고    scopus 로고
    • Muller, F., Valette, F.: High-order attacks against the exponent splitting protection. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 315-329. Springer, Heidelberg (2006)
    • Muller, F., Valette, F.: High-order attacks against the exponent splitting protection. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 315-329. Springer, Heidelberg (2006)
  • 4
    • 35048860937 scopus 로고    scopus 로고
    • Mamiya, H., Miyaji, A., Morimoto, H.: Efficient countermeasure against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 343-356. Springer, Heidelberg (2004)
    • Mamiya, H., Miyaji, A., Morimoto, H.: Efficient countermeasure against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 343-356. Springer, Heidelberg (2004)
  • 5
    • 84880293917 scopus 로고    scopus 로고
    • Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
    • Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
  • 6
    • 84902477345 scopus 로고    scopus 로고
    • Efficient countermeasure against power analysis for elliptic curve cryptosystems
    • Kluwer Academic Pub, Dordrecht
    • Itoh, K., Izu, T., Takenaka, M.: Efficient countermeasure against power analysis for elliptic curve cryptosystems. In: Smart Card Research and Advanced Applications VI - CARDIS 2004, pp. 99-113. Kluwer Academic Pub, Dordrecht (2004)
    • (2004) Smart Card Research and Advanced Applications VI - CARDIS , pp. 99-113
    • Itoh, K.1    Izu, T.2    Takenaka, M.3
  • 7
    • 35248898400 scopus 로고    scopus 로고
    • Itoh, K., Izu, T., Takenaka, M.: Address-differential power analysis of cryptographic scheme OK-ECDH and OK-ECDSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 129-143. Springer, Heidelberg (2003)
    • Itoh, K., Izu, T., Takenaka, M.: Address-differential power analysis of cryptographic scheme OK-ECDH and OK-ECDSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 129-143. Springer, Heidelberg (2003)
  • 8
    • 35248873415 scopus 로고    scopus 로고
    • Itoh, K., Izu, T., Takenaka, M.: A practical countermeasure against address-bit differential power analysis. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 382-396. Springer, Heidelberg (2003)
    • Itoh, K., Izu, T., Takenaka, M.: A practical countermeasure against address-bit differential power analysis. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 382-396. Springer, Heidelberg (2003)
  • 9
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
    • Roy, B, Okamoto, E, eds, INDOCRYPT 2000, Springer, Heidelberg
    • Okeya, K., Sakurai, K.: Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 178-190. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 10
    • 35248816371 scopus 로고    scopus 로고
    • Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 199-210. Springer, Heidelberg (2002)
    • Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199-210. Springer, Heidelberg (2002)
  • 12
    • 0142156711 scopus 로고    scopus 로고
    • Ciet, M., Joye, M. (Vertually)Free randomization technique for elliptic curve cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, 2836, pp. 348-359. Springer, Heidelberg (2003)
    • Ciet, M., Joye, M. (Vertually)Free randomization technique for elliptic curve cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 348-359. Springer, Heidelberg (2003)
  • 13
    • 84944884283 scopus 로고    scopus 로고
    • Joye, M., Quisquater, J.: Hessian elliptic curves and side-channel attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 402-410. Springer, Heidelberg (2001)
    • Joye, M., Quisquater, J.: Hessian elliptic curves and side-channel attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 402-410. Springer, Heidelberg (2001)
  • 14
    • 84944901711 scopus 로고    scopus 로고
    • Joye, M., Tymen, C.: Protections against Differential Analysis for Elliptic Curve Cryptography. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 377-390. Springer, Heidelberg (2001)
    • Joye, M., Tymen, C.: Protections against Differential Analysis for Elliptic Curve Cryptography. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377-390. Springer, Heidelberg (2001)
  • 15
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 16
    • 35248881073 scopus 로고    scopus 로고
    • Fouque, P., Valette, F.: The doubling attack- why upwards is better than downwards. In: D.Walter, C., Koç, Ç.K., Paar, C (eds.) CHES 2003. LNCS, 2779, pp. 269-280. Springer, Heidelberg (2003)
    • Fouque, P., Valette, F.: The doubling attack- why upwards is better than downwards. In: D.Walter, C., Koç, Ç.K., Paar, C (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
  • 17
    • 84944898712 scopus 로고    scopus 로고
    • Liardet, P., Smart, N.: Preventing SPA/DPA in ECC systems using the Jacobi form. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 391-401. Springer, Heidelberg (2001)
    • Liardet, P., Smart, N.: Preventing SPA/DPA in ECC systems using the Jacobi form. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 391-401. Springer, Heidelberg (2001)
  • 18
    • 33646183037 scopus 로고    scopus 로고
    • Yen, S., Lien, W., Moon, S., Ha, J.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 183-195. Springer, Heidelberg (2005)
    • Yen, S., Lien, W., Moon, S., Ha, J.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 183-195. Springer, Heidelberg (2005)
  • 19
    • 35248871165 scopus 로고    scopus 로고
    • Akishita, T., Takagi, T.: Zero-value point attacks on elliptic curve cryptosystem. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 218-233. Springer, Heidelberg (2003)
    • Akishita, T., Takagi, T.: Zero-value point attacks on elliptic curve cryptosystem. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 218-233. Springer, Heidelberg (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.