메뉴 건너뛰기




Volumn 5747 LNCS, Issue , 2009, Pages 289-303

Programmable and parallel ECC coprocessor architecture: Tradeoffs between area, speed and security

Author keywords

[No Author keywords available]

Indexed keywords

CO-PROCESSOR ARCHITECTURE; CO-PROCESSORS; ELLIPTIC CURVE CRYPTOGRAPHY; FAULT ATTACK; FAULT INJECTION; SIDE CHANNEL ATTACK;

EID: 70350583033     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04138-9_21     Document Type: Conference Paper
Times cited : (18)

References (37)
  • 1
    • 37149012925 scopus 로고    scopus 로고
    • Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware
    • Alrimeih, H., Rakhmatov, D.: Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware. IEEE Design & Test of Computers 24(6), 556-569 (2007)
    • (2007) IEEE Design & Test of Computers , vol.24 , Issue.6 , pp. 556-569
    • Alrimeih, H.1    Rakhmatov, D.2
  • 2
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, C.1    Jaffe, J.2    Jun, B.3
  • 5
    • 84949979593 scopus 로고    scopus 로고
    • A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
    • Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
    • Yen, S.-M., Kim, S., Lim, S., Moon, S.-J.: A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 414-427. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2288 , pp. 414-427
    • Yen, S.-M.1    Kim, S.2    Lim, S.3    Moon, S.-J.4
  • 6
    • 37149051633 scopus 로고    scopus 로고
    • Baek, Y.-J., Vasyltsov, I.: How to prevent DPA and fault attack in a unified way for ECC scalar multiplication - ring extension method. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, 4464, pp. 225-237. Springer, Heidelberg (2007)
    • Baek, Y.-J., Vasyltsov, I.: How to prevent DPA and fault attack in a unified way for ECC scalar multiplication - ring extension method. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 225-237. Springer, Heidelberg (2007)
  • 9
    • 84947913604 scopus 로고    scopus 로고
    • m). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 316-327. Springer, Heidelberg (1999)
    • m). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 316-327. Springer, Heidelberg (1999)
  • 10
    • 33750822634 scopus 로고    scopus 로고
    • m). In: ISCAS 2001, IV, pp. 37-40. IEEE, Los Alamitos (2001)
    • m). In: ISCAS 2001, vol. IV, pp. 37-40. IEEE, Los Alamitos (2001)
  • 11
    • 33748500029 scopus 로고    scopus 로고
    • m) Multipliers for Curve-Based Cryptography. IEEE Transactions on Computers 55(10), 1306-1311 (2006)
    • m) Multipliers for Curve-Based Cryptography. IEEE Transactions on Computers 55(10), 1306-1311 (2006)
  • 13
    • 33750829460 scopus 로고    scopus 로고
    • Koschuch, M., Lechner, J., Weitzer, A., Großschädl, J., Szekely, A., Tillich, S., Wolkerstorfer, J.: Hardware/Software co-design of elliptic curve cryptography on an 8051 microcontroller. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 430-444. Springer, Heidelberg (2006)
    • Koschuch, M., Lechner, J., Weitzer, A., Großschädl, J., Szekely, A., Tillich, S., Wolkerstorfer, J.: Hardware/Software co-design of elliptic curve cryptography on an 8051 microcontroller. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 430-444. Springer, Heidelberg (2006)
  • 14
    • 33750695616 scopus 로고    scopus 로고
    • Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.: Superscalar Coprocessor for High-Speed Curve-Based Cryptography. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 415-429. Springer, Heidelberg (2006)
    • Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.: Superscalar Coprocessor for High-Speed Curve-Based Cryptography. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 415-429. Springer, Heidelberg (2006)
  • 15
    • 47949090625 scopus 로고    scopus 로고
    • Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. In: FDTC
    • Los Alamitos
    • Amiel, F., Villegas, K., Feix, B., Marcel, L.: Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. In: FDTC 2007, pp. 92-102. IEEE, Los Alamitos (2007)
    • (2007) 92-102. IEEE , pp. 2007
    • Amiel, F.1    Villegas, K.2    Feix, B.3    Marcel, L.4
  • 16
    • 84880293917 scopus 로고    scopus 로고
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
  • 17
    • 35248817849 scopus 로고    scopus 로고
    • Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 29-45. Springer, Heidelberg (2003)
    • Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29-45. Springer, Heidelberg (2003)
  • 18
    • 84894447348 scopus 로고    scopus 로고
    • Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided?
    • IEEE Computer Society Press, Los Alamitos
    • Ciet, M., Neve, M., Peeters, E., Quisquater, J.: Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided? In: IEEE International Symposium on Micro-NanoMechatronics and Human Science, vol. 2, pp. 806-810. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) IEEE International Symposium on Micro-NanoMechatronics and Human Science , vol.2 , pp. 806-810
    • Ciet, M.1    Neve, M.2    Peeters, E.3    Quisquater, J.4
  • 19
    • 35248881073 scopus 로고    scopus 로고
    • Fouque, P.-A., Valette, F.: The Doubling Attack - Why Upwards Is Better than Downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 269-280. Springer, Heidelberg (2003)
    • Fouque, P.-A., Valette, F.: The Doubling Attack - Why Upwards Is Better than Downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
  • 20
    • 18744405402 scopus 로고    scopus 로고
    • Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
    • Ciet, M., Joye, M.: Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Design, Codes and Cryptography 36, 33-43 (2005)
    • (2005) Design, Codes and Cryptography , vol.36 , pp. 33-43
    • Ciet, M.1    Joye, M.2
  • 21
    • 33845275817 scopus 로고    scopus 로고
    • Blömer, J., Otto, M., Seifert, J.-P.: Sign change fault attacks on elliptic curve cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 36-52. Springer, Heidelberg (2006)
    • Blömer, J., Otto, M., Seifert, J.-P.: Sign change fault attacks on elliptic curve cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 36-52. Springer, Heidelberg (2006)
  • 22
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output not be enough against fault-based cryptanalysis
    • Yen, S.-M., Joye, M.: Checking before output not be enough against fault-based cryptanalysis. IEEE Trans. on Computers 49(9), 967-970 (2000)
    • (2000) IEEE Trans. on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.-M.1    Joye, M.2
  • 23
    • 84983134283 scopus 로고    scopus 로고
    • Differential Fault Attacks on Elliptic Curve Cryptosystems
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Biehl, I., Meyer, B., Müller, V.: Differential Fault Attacks on Elliptic Curve Cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131-146. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 131-146
    • Biehl, I.1    Meyer, B.2    Müller, V.3
  • 25
    • 47949128115 scopus 로고    scopus 로고
    • How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: FDTC
    • Los Alamitos
    • Kim, C.H., Quisquater, J.-J.: How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: FDTC 2007, pp. 21-29. IEEE, Los Alamitos (2007)
    • (2007) 21-29. IEEE , pp. 2007
    • Kim, C.H.1    Quisquater, J.-J.2
  • 26
    • 52949134889 scopus 로고    scopus 로고
    • Joye, M.: On the Security of a Unified Countermeasure. In: FDTC 2008, pp. 87-91. IEEE, Los Alamitos (2008)
    • Joye, M.: On the Security of a Unified Countermeasure. In: FDTC 2008, pp. 87-91. IEEE, Los Alamitos (2008)
  • 27
    • 0142156711 scopus 로고    scopus 로고
    • Joye, M., Ciet, M. (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, 2836, pp. 348-359. Springer, Heidelberg (2003)
    • Joye, M., Ciet, M. (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 348-359. Springer, Heidelberg (2003)
  • 28
    • 33947318808 scopus 로고    scopus 로고
    • Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem
    • IEEE, Los Alamitos
    • De Mulder, E., Ors, S.B., Preneel, B., Verbauwhede, I.: Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem. In: EUROCON 2005, vol. 2, pp. 1879-1882. IEEE, Los Alamitos (2005)
    • (2005) EUROCON , vol.2 , pp. 1879-1882
    • De Mulder, E.1    Ors, S.B.2    Preneel, B.3    Verbauwhede, I.4
  • 29
    • 70350059460 scopus 로고    scopus 로고
    • Guo, X., Schaumont, P.: Optimizing the HW/SW Boundary of an ECC SoC Design Using Control Hierarchy and Distributed Storage. In: DATE 2009, pp. 454-459. EDAA (2009)
    • Guo, X., Schaumont, P.: Optimizing the HW/SW Boundary of an ECC SoC Design Using Control Hierarchy and Distributed Storage. In: DATE 2009, pp. 454-459. EDAA (2009)
  • 30
    • 67149129961 scopus 로고    scopus 로고
    • Guo, X., Schaumont, P.: Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA based SoC Platform. In: Becker, J., Woods, R., Athanas, P., Morgan, F. (eds.) ARC 2009. LNCS, 5453, pp. 169-180. Springer, Heidelberg (2009)
    • Guo, X., Schaumont, P.: Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA based SoC Platform. In: Becker, J., Woods, R., Athanas, P., Morgan, F. (eds.) ARC 2009. LNCS, vol. 5453, pp. 169-180. Springer, Heidelberg (2009)
  • 31
    • 33845221322 scopus 로고    scopus 로고
    • Malkin, T.G., Standaert, F.-X., Yung, M.: A Comparative Cost/Security Analysis of Fault Attack Countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 159-172. Springer, Heidelberg (2006)
    • Malkin, T.G., Standaert, F.-X., Yung, M.: A Comparative Cost/Security Analysis of Fault Attack Countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 159-172. Springer, Heidelberg (2006)
  • 32
    • 33645675518 scopus 로고    scopus 로고
    • AES-Based Security Coprocessor IC in 0.18um CMOS with resistance to differential power analysis side-channel attacks
    • Hwang, D., Tiri, K., Hodjat, A., Lai, B.C., Yang, S., Schaumont, P., Verbauwhede, I.: AES-Based Security Coprocessor IC in 0.18um CMOS with resistance to differential power analysis side-channel attacks. IEEE Journal of Solid-State Circuits 41(4), 781-791 (2006)
    • (2006) IEEE Journal of Solid-State Circuits , vol.41 , Issue.4 , pp. 781-791
    • Hwang, D.1    Tiri, K.2    Hodjat, A.3    Lai, B.C.4    Yang, S.5    Schaumont, P.6    Verbauwhede, I.7
  • 33
    • 33750719570 scopus 로고    scopus 로고
    • Chen, Z., Zhou, Y.: Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side-Channel Leakage. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 242-254. Springer, Heidelberg (2006)
    • Chen, Z., Zhou, Y.: Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side-Channel Leakage. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 242-254. Springer, Heidelberg (2006)
  • 34
    • 33747624721 scopus 로고    scopus 로고
    • Giraud, C.: An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Trans. on Computers 55(9), 1116-1120 (2006)
    • Giraud, C.: An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Trans. on Computers 55(9), 1116-1120 (2006)
  • 35
    • 58449112739 scopus 로고    scopus 로고
    • Koschuch, M., Großschädl, J., Payer, U., Hudler, M., Krüger, M.: Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, 5339, pp. 349-365. Springer, Heidelberg (2008)
    • Koschuch, M., Großschädl, J., Payer, U., Hudler, M., Krüger, M.: Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 349-365. Springer, Heidelberg (2008)
  • 36
    • 70350585649 scopus 로고    scopus 로고
    • Sakiyama, K., Batina, L., Schaumont, P., Verbauwhede, I.: HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems. In: ECRYPT Workshop on Cryptographic Advances in Secure Hardware (2005)
    • Sakiyama, K., Batina, L., Schaumont, P., Verbauwhede, I.: HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems. In: ECRYPT Workshop on Cryptographic Advances in Secure Hardware (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.