메뉴 건너뛰기




Volumn , Issue , 2008, Pages 92-98

Fault attack on elliptic curve with montgomery ladder implementation

Author keywords

EC cryptosystem; Fault attack; Montgomery ladder

Indexed keywords

CRYPTOGRAPHY; ELECTRIC FAULT CURRENTS; QUALITY ASSURANCE; RELIABILITY; STANDARDS;

EID: 52949099582     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FDTC.2008.15     Document Type: Conference Paper
Times cited : (74)

References (22)
  • 1
    • 84983134283 scopus 로고    scopus 로고
    • Differential Fault Attacks on Elliptic Curve Cryptosystems
    • Springer-Verlag, editor, CRYPTO
    • I. Biehl, B. Meyer, and V. Müller. Differential Fault Attacks on Elliptic Curve Cryptosystems. In Springer-Verlag, editor, CRYPTO, LNCS, pages 131-146, 2000.
    • (2000) LNCS , pp. 131-146
    • Biehl, I.1    Meyer, B.2    Müller, V.3
  • 2
    • 33845275817 scopus 로고    scopus 로고
    • Sign Change Fault Attacks on Elliptic Curve Cryptosystems
    • Springer-Verlag, editor, FDTC '06
    • J. Blömer, M. Otto, and J-P. Seifert. Sign Change Fault Attacks on Elliptic Curve Cryptosystems. In Springer-Verlag, editor, FDTC '06, LNCS, pages 36-52, 2006.
    • (2006) LNCS , pp. 36-52
    • Blömer, J.1    Otto, M.2    Seifert, J.-P.3
  • 3
    • 3042641393 scopus 로고    scopus 로고
    • On the Importance of Eliminating Errors in Cryptographic Computations
    • D. Boneh, R.A. DeMillo, and R.J. Lipton. On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptology, 14(2):101-119, 2001.
    • (2001) J. Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 4
    • 84958760024 scopus 로고    scopus 로고
    • Elliptic Curve Based Password Authenticated Key Exchange Protocols
    • Springer-Verlag, editor, ACISP '01
    • C. Boyd, P. Montague, and K. Nguyen. Elliptic Curve Based Password Authenticated Key Exchange Protocols. In Springer-Verlag, editor, ACISP '01, LNCS, pages 487-501, 2001.
    • (2001) LNCS , pp. 487-501
    • Boyd, C.1    Montague, P.2    Nguyen, K.3
  • 5
    • 33750696616 scopus 로고    scopus 로고
    • Why One Should Also Secure RSA Public Key Elements
    • Springer-Verlag, editor, CHES '06
    • E. Brier, B. Chevallier-Mames, M. Ciet, and C. Clavier. Why One Should Also Secure RSA Public Key Elements. In Springer-Verlag, editor, CHES '06, LNCS, pages 324-338, 2006.
    • (2006) LNCS , pp. 324-338
    • Brier, E.1    Chevallier-Mames, B.2    Ciet, M.3    Clavier, C.4
  • 6
    • 33745812321 scopus 로고    scopus 로고
    • The Twist-AUgmented Technique for Key Exchange
    • Springer-Verlag, editor, PKC '06
    • O. Chevassut, P.-A. Fouque, P. Gaudry, and D. Pointcheval. The Twist-AUgmented Technique for Key Exchange. In Springer-Verlag, editor, PKC '06, LNCS, pages 410-426, 2006.
    • (2006) LNCS , pp. 410-426
    • Chevassut, O.1    Fouque, P.-A.2    Gaudry, P.3    Pointcheval, D.4
  • 7
    • 18744405402 scopus 로고    scopus 로고
    • Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
    • M. Ciet and M. Joye. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Des. Codes Cryptography, 36(1):33-43, 2005.
    • (2005) Des. Codes Cryptography , vol.36 , Issue.1 , pp. 33-43
    • Ciet, M.1    Joye, M.2
  • 8
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Springer-Verlag, editor, CHES'99
    • J. S. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Springer-Verlag, editor, CHES'99, LNCS, pages 292-302, 1999.
    • (1999) LNCS , pp. 292-302
    • Coron, J.S.1
  • 9
    • 52949103508 scopus 로고    scopus 로고
    • Digital Signature Standard (DSS), appendix 6: "Recommended Elliptic Curves for Federal Government Use
    • Federal Information Processing Standards Publication FIPS 186-2, Technical report, NIST, January 27
    • Federal Information Processing Standards Publication FIPS 186-2. Digital Signature Standard (DSS), appendix 6: "Recommended Elliptic Curves for Federal Government Use". Technical report, NIST, January 27 2000.
    • (2000)
  • 10
    • 35248881073 scopus 로고    scopus 로고
    • The Doubling Attack - hy Upwards Is Better than Downwards
    • Springer-Verlag, editor, CHES'03
    • P. A. Fouque and F. Valette. The Doubling Attack - hy Upwards Is Better than Downwards. In Springer-Verlag, editor, CHES'03, LNCS, pages 269-280, 2003.
    • (2003) LNCS , pp. 269-280
    • Fouque, P.A.1    Valette, F.2
  • 11
    • 35248816371 scopus 로고    scopus 로고
    • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
    • Springer-Verlag, editor, PKC'03
    • L. Goubin. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. In Springer-Verlag, editor, PKC'03, LNCS, pages 199-210, 2003.
    • (2003) LNCS , pp. 199-210
    • Goubin, L.1
  • 12
    • 84974665915 scopus 로고    scopus 로고
    • Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
    • Springer-Verlag, editor, INDOCRYPT '02
    • T. Izu, B. Möller, and T. Takagi. Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. In Springer-Verlag, editor, INDOCRYPT '02, LNCS, pages 296-313, 2002.
    • (2002) LNCS , pp. 296-313
    • Izu, T.1    Möller, B.2    Takagi, T.3
  • 13
    • 35248874869 scopus 로고    scopus 로고
    • The Montgomery Powering Ladder
    • Springer-Verlag, editor, CHES'02
    • M. Joye and S. M. Yen. The Montgomery Powering Ladder. In Springer-Verlag, editor, CHES'02, LNCS, pages 291-302, 2002.
    • (2002) LNCS , pp. 291-302
    • Joye, M.1    Yen, S.M.2
  • 14
    • 0025790774 scopus 로고
    • One-Way Permutations on Elliptic Curves
    • B. S. Kaliski. One-Way Permutations on Elliptic Curves. J. Cryptology, 3(3):187-199, 1991.
    • (1991) J. Cryptology , vol.3 , Issue.3 , pp. 187-199
    • Kaliski, B.S.1
  • 16
    • 35048902569 scopus 로고    scopus 로고
    • A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
    • ESORICS'04, of, Springer-Verlag
    • B. Möller. A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts. In ESORICS'04, volume 3193 of LNCS, pages 335-351. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3193 , pp. 335-351
    • Möller, B.1
  • 17
    • 84968484435 scopus 로고
    • Speeding the Pollard and Elliptic Curve Methods of Factorization
    • jan
    • P. L. Montgomery. Speeding the Pollard and Elliptic Curve Methods of Factorization. Math. Comp, 48(177):243-264, jan 1987.
    • (1987) Math. Comp , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 18
    • 84919085619 scopus 로고
    • An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance
    • january
    • S. C. Pohlig and M. E. Hellman. An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance. IEEE Transactions on Information Theory, IT-24(1): 106-110, january 1978.
    • (1978) IEEE Transactions on Information Theory , vol.IT-24 , Issue.1 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 19
    • 84966238549 scopus 로고
    • Monte Carlo Methods for Index Computation (mod p)
    • July
    • J. M. Pollard. Monte Carlo Methods for Index Computation (mod p). Mathematics of Computation, 32(143):918-924, July 1978.
    • (1978) Mathematics of Computation , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.M.1
  • 20
    • 52949110380 scopus 로고    scopus 로고
    • J.H. Silverman. The arithmetic of elliptic curves, 106 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1986. Corrected reprint of the 1986 original.
    • J.H. Silverman. The arithmetic of elliptic curves, volume 106 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1986. Corrected reprint of the 1986 original.
  • 21
    • 1642319117 scopus 로고    scopus 로고
    • SEC 2: Recommended Elliptic Curve Domain Parameters
    • Standards for Efficient Cryptography Group SECG, Technical report, SECG, 2000
    • Standards for Efficient Cryptography Group (SECG). SEC 2: Recommended Elliptic Curve Domain Parameters. Technical report, SECG, 2000.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.