메뉴 건너뛰기




Volumn , Issue , 2007, Pages 194-200

A side-channel attack resistant programmable PKC coprocessor for embedded applications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER SYSTEMS; CRYPTOGRAPHY; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); PUBLIC KEY CRYPTOGRAPHY;

EID: 47749123850     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSAMOS.2007.4285751     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 2
    • 0036289883 scopus 로고    scopus 로고
    • M. Bednara, M. Daldrup, J. Teich, J. von zur Gathen, and J. Shokrollahi. Tradeoff Analysis of FPGA Based Elliptic Curve Cryptosystems. In Proceedings of The IEEE International Symposium on Circuits and Systems (ISCAS), pages 797-800, Scottsdale, Arizona, USA, May 26-29 2002.
    • M. Bednara, M. Daldrup, J. Teich, J. von zur Gathen, and J. Shokrollahi. Tradeoff Analysis of FPGA Based Elliptic Curve Cryptosystems. In Proceedings of The IEEE International Symposium on Circuits and Systems (ISCAS), pages 797-800, Scottsdale, Arizona, USA, May 26-29 2002.
  • 3
    • 0035390239 scopus 로고    scopus 로고
    • High-radix Montgomery modular exponentiation on reconfigurable hardware
    • T. Blum and C. Paar. High-radix Montgomery modular exponentiation on reconfigurable hardware. IEEE Transactions on Computers, 50(7):759-764, 2001.
    • (2001) IEEE Transactions on Computers , vol.50 , Issue.7 , pp. 759-764
    • Blum, T.1    Paar, C.2
  • 5
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Ç. K. Koç and C. Paar, editors, Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems CHES, Worcester, Massachusetts, USA, August 12-13, Springer-Verlag
    • J.-S. Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In Ç. K. Koç and C. Paar, editors, Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 1717 in Lecture Notes in Computer Science, pages 292-302, Worcester, Massachusetts, USA, August 12-13 1999. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , Issue.1717 , pp. 292-302
    • Coron, J.-S.1
  • 6
    • 0035505389 scopus 로고    scopus 로고
    • An energy-efficient reconfigurable public-key cryptography processor
    • November
    • J. Goodman and A.P. Chandrakasan. An energy-efficient reconfigurable public-key cryptography processor. IEEE Journal of Solid-State Circuits, 36(11):1808-1820, November 2001.
    • (2001) IEEE Journal of Solid-State Circuits , vol.36 , Issue.11 , pp. 1808-1820
    • Goodman, J.1    Chandrakasan, A.P.2
  • 7
    • 84949500765 scopus 로고    scopus 로고
    • The Chinese remainder theorem and its application in a high-speed RSA crypto chip
    • New Orleans, Louisiana, USA, December 11-15, IEEE Computer Society Press
    • J. Grosschadl. The Chinese remainder theorem and its application in a high-speed RSA crypto chip. In Proceedings of the 16th Annual Computer Security Application Conference, pages 384-393, New Orleans, Louisiana, USA, December 11-15 2000. IEEE Computer Society Press.
    • (2000) Proceedings of the 16th Annual Computer Security Application Conference , pp. 384-393
    • Grosschadl, J.1
  • 8
    • 0008321437 scopus 로고    scopus 로고
    • Standard specifications for public key cryptography,
    • IEEE P1363
    • IEEE P1363. Standard specifications for public key cryptography, 1999.
    • (1999)
  • 9
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • N. Koblitz. Elliptic curve cryptosystem. Math. Comp., 48:203-209, 1987.
    • (1987) Math. Comp , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 12
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO, Santa Barbara, CA, USA, August 15-19, Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO, number 1666 in Lecture Notes in Computer Science, pages 388-397, Santa Barbara, CA, USA, August 15-19 1999. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , Issue.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 15
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • H. C. Williams, editor, Advances in Cryptology: Proceedings of CRYPTO, number in, Springer-Verlag
    • V. Miller. Uses of elliptic curves in cryptography. In H. C. Williams, editor, Advances in Cryptology: Proceedings of CRYPTO, number 218 in Lecture Notes in Computer Science, pages 417-426. Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.1
  • 16
    • 68549097842 scopus 로고    scopus 로고
    • m)
    • Ç.K. Koç and C. Paar, editors, Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems CHES, Springer-Verlag
    • m). In Ç.K. Koç and C. Paar, editors, Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES), number 1965 in Lecture Notes in Computer Science, pages 41-56. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , Issue.1965 , pp. 41-56
    • Orlando, G.1    Paar, C.2
  • 17
    • 35248847436 scopus 로고    scopus 로고
    • Power-analysis attacks on an FPGA - first experimental results
    • C. Walter, Ç. K. Koç, and C. Paar, editors, Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems CHES, number in, Cologne, Germany, September 7-10, Springer-Verlag
    • S. B. Ors, E. Oswald, and B. Preneel. Power-analysis attacks on an FPGA - first experimental results. In C. Walter, Ç. K. Koç, and C. Paar, editors, Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2779 in Lecture Notes in Computer Science, pages 35-50, Cologne, Germany, September 7-10 2003. Springer-Verlag.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 35-50
    • Ors, S.B.1    Oswald, E.2    Preneel, B.3
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 22
    • 24744465637 scopus 로고    scopus 로고
    • Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
    • M. Joye and J.-J. Quisquater, editors, Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems CHES, number in, Springer-Verlag
    • F.-X. Standaert, S. B. Ors, and B. Preneel. Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? In M. Joye and J.-J. Quisquater, editors, Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 3156 in Lecture Notes in Computer Science, page 3044. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 3044
    • Standaert, F.-X.1    Ors, S.B.2    Preneel, B.3
  • 23
    • 47749084572 scopus 로고    scopus 로고
    • m). In B.S. Kaliski Jr., Ç.Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2523 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • m). In B.S. Kaliski Jr., Ç.Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2523 in Lecture Notes in Computer Science. Springer-Verlag, 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.