메뉴 건너뛰기




Volumn 5381 LNCS, Issue , 2008, Pages 346-360

Distinguishing multiplications from squaring operations

Author keywords

Differential power analysis; Modular multiplication and exponentiation; RSA; Side channel attacks; Square and multiply algorithm

Indexed keywords

DIFFERENTIAL POWER ANALYSIS; MODULAR MULTIPLICATION AND EXPONENTIATION; RSA; SIDE CHANNEL ATTACKS; SQUARE AND MULTIPLY ALGORITHM;

EID: 70350639756     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04159-4_22     Document Type: Conference Paper
Times cited : (27)

References (30)
  • 1
    • 33745805198 scopus 로고    scopus 로고
    • Power analysis to ECC using differential power between multiplication and squaring
    • Domingo-Ferrer, J, Posegga, J, Schreckling, D, eds, CARDIS 2006, Springer, Heidelberg
    • Akishita, T., Takagi, T.: Power analysis to ECC using differential power between multiplication and squaring. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 151-164. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3928 , pp. 151-164
    • Akishita, T.1    Takagi, T.2
  • 2
    • 38549098459 scopus 로고    scopus 로고
    • Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, 4876, pp. 110-125. Springer, Heidelberg (2007)
    • Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 110-125. Springer, Heidelberg (2007)
  • 3
    • 70350628754 scopus 로고    scopus 로고
    • ARM
    • ARM. SecurCore family, http://www.arm.com/products/CPUs/families/ SecurCoreFamily.html
    • SecurCore family
  • 5
    • 85034497704 scopus 로고
    • Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Barrett, P.: Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311-323. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 311-323
    • Barrett, P.1
  • 6
    • 38049042605 scopus 로고    scopus 로고
    • Advances in Elliptic Curve Cryptography
    • Cambridge University Press, London Mathematical Society
    • Blake, I., Seroussi, G., Smart, N.: Advances in Elliptic Curve Cryptography. Lecture Note Series, vol. 317. Cambridge University Press, London Mathematical Society (2005)
    • (2005) Lecture Note Series , vol.317
    • Blake, I.1    Seroussi, G.2    Smart, N.3
  • 7
    • 84947735905 scopus 로고    scopus 로고
    • An attack on RSA given a small fraction of the private key bits
    • Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
    • Boneh, D., Durfee, G., Frankel, Y.: An attack on RSA given a small fraction of the private key bits. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 25-34. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1514 , pp. 25-34
    • Boneh, D.1    Durfee, G.2    Frankel, Y.3
  • 8
    • 35048818034 scopus 로고    scopus 로고
    • Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 16-29. Springer, Heidelberg (2004)
    • Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
  • 9
    • 84958979095 scopus 로고    scopus 로고
    • Brier, É., Joye, M.: Weierstraß elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, 2274, pp. 335-345. Springer, Heidelberg (2002)
    • Brier, É., Joye, M.: Weierstraß elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 335-345. Springer, Heidelberg (2002)
  • 10
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers 53(6), 760-768 (2004)
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevallier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 11
    • 84880293917 scopus 로고    scopus 로고
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
  • 13
    • 33750716484 scopus 로고    scopus 로고
    • Fouque, P.-A., Kunz-Jacques, S., Martinet, G., Muller, F., Valette, F.: Power attack on small RSA public exponent. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 339-353. Springer, Heidelberg (2006)
    • Fouque, P.-A., Kunz-Jacques, S., Martinet, G., Muller, F., Valette, F.: Power attack on small RSA public exponent. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 339-353. Springer, Heidelberg (2006)
  • 14
    • 35248881073 scopus 로고    scopus 로고
    • Fouque, P.-A., Valette, F.: The doubling attack - why upwards is better than downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 269-280. Springer, Heidelberg (2003)
    • Fouque, P.-A., Valette, F.: The doubling attack - why upwards is better than downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
  • 15
    • 0242286594 scopus 로고    scopus 로고
    • Computing the distribution of the product of two continuous random variables
    • Glen, A.G., Leemis, L.M., Drew, J.H.: Computing the distribution of the product of two continuous random variables. Computaional Satatistics and Data Analysis 44(3), 451-464 (2004)
    • (2004) Computaional Satatistics and Data Analysis , vol.44 , Issue.3 , pp. 451-464
    • Glen, A.G.1    Leemis, L.M.2    Drew, J.H.3
  • 16
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 17
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 19
    • 84949514743 scopus 로고    scopus 로고
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 144-157. Springer, Heidelberg (1999)
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144-157. Springer, Heidelberg (1999)
  • 20
    • 84941154719 scopus 로고    scopus 로고
    • MIPS-Technologies
    • MIPS-Technologies. SmartMIPS ASE, http://www.mips.com/content/Products/
    • SmartMIPS ASE
  • 21
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • Montgomery, P.: Modular multiplication without trial division. Mathematics of Computation 44, 519-521 (1985)
    • (1985) Mathematics of Computation , vol.44 , pp. 519-521
    • Montgomery, P.1
  • 22
    • 0003508562 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, DSS, FIPS-186-2
    • National Institute of Standards and Technology. Digital signature standard (DSS), FIPS-186-2 (2000)
    • (2000) Digital signature standard
  • 23
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., Adleman, L.M.: Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.M.3
  • 24
    • 33750740079 scopus 로고    scopus 로고
    • Stebila, D., Thériault, N.: Unified point addition formulæ and side-channel attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 354-368. Springer, Heidelberg (2006)
    • Stebila, D., Thériault, N.: Unified point addition formulæ and side-channel attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 354-368. Springer, Heidelberg (2006)
  • 25
    • 0033204468 scopus 로고    scopus 로고
    • Montgomery exponentiation needs no final subtractions
    • Walter, C.D.: Montgomery exponentiation needs no final subtractions. Electronic Letters 35(21), 1831-1832 (1999)
    • (1999) Electronic Letters , vol.35 , Issue.21 , pp. 1831-1832
    • Walter, C.D.1
  • 26
    • 84949504956 scopus 로고    scopus 로고
    • Walter, C.D.: Montgomery's multiplication technique: How to make it smaller and faster. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 80-93. Springer, Heidelberg (1999)
    • Walter, C.D.: Montgomery's multiplication technique: How to make it smaller and faster. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 80-93. Springer, Heidelberg (1999)
  • 27
    • 84944888189 scopus 로고    scopus 로고
    • Walter, C.D.: Sliding windows succumbs to big mac attack. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 286-299. Springer, Heidelberg (2001)
    • Walter, C.D.: Sliding windows succumbs to big mac attack. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 286-299. Springer, Heidelberg (2001)
  • 28
    • 35048869588 scopus 로고    scopus 로고
    • Walter, C.D.: Longer keys may facilitate side channel attacks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 42-57. Springer, Heidelberg (2004)
    • Walter, C.D.: Longer keys may facilitate side channel attacks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 42-57. Springer, Heidelberg (2004)
  • 29
    • 27944441030 scopus 로고    scopus 로고
    • Data dependent power use in multipliers
    • Montuschi, P, Shwarz, E, eds, IEEE, Los Alamitos
    • Walter, C.D., Samyde, D.: Data dependent power use in multipliers. In: Montuschi, P., Shwarz, E. (eds.) 17th Symposium on Computer Arithmetic (ARITH), pp. 4-12. IEEE, Los Alamitos (2005)
    • (2005) 17th Symposium on Computer Arithmetic (ARITH) , pp. 4-12
    • Walter, C.D.1    Samyde, D.2
  • 30
    • 33646183037 scopus 로고    scopus 로고
    • Yen, S.-M., Lien, W.-C., Moon, S.-J., Ha, J.C.: Power analysis by exploiting chosen message and internal collisions - vulnerability of checking mechanism for RSA-decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 183-195. Springer, Heidelberg (2005)
    • Yen, S.-M., Lien, W.-C., Moon, S.-J., Ha, J.C.: Power analysis by exploiting chosen message and internal collisions - vulnerability of checking mechanism for RSA-decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 183-195. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.