메뉴 건너뛰기




Volumn 1717, Issue , 1999, Pages 292-302

Resistance against differential power analysis for elliptic curve cryptosystems

Author keywords

Differential power analysis; Elliptic curve; Power consumption

Indexed keywords

ELECTRIC POWER UTILIZATION; EMBEDDED SYSTEMS; GEOMETRY; RECOVERY; SMART CARDS;

EID: 84880293917     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48059-5_25     Document Type: Conference Paper
Times cited : (787)

References (18)
  • 4
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • D. Chaum. Security without identification: transaction systems to make Big Brother obsolete, Communications ofthe ACM, vol. 28, n. 10, Oct 1985, pp. 1030-1044.
    • (1985) Communications Ofthe ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 6
    • 34248682000 scopus 로고
    • Data encryption standard
    • U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virgini
    • FIPS 46, Data encryption standard, Federal Information Processing Standards Publication 46, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1977.
    • (1977) Federal Information Processing Standards Publication , vol.46
  • 8
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Info. Theory, IT-31, 1985, pp 469-472.
    • (1985) IEEE Trans. Info. Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 9
    • 0000490812 scopus 로고    scopus 로고
    • A Survey of Fast Exponentiation Methods
    • D.M. Gordon. A Survey of Fast Exponentiation Methods, Journal of Algorithms 27, 129-146 (1998).
    • (1998) Journal of Algorithms , vol.27 , pp. 129-146
    • Gordon, D.M.1
  • 12
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • N. Koblitz. Elliptic Curve Cryptosystems, Mathematics of Computation, vol. 48, 1987, pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • RSA, DSS and other systems, Advances in Cryptology, Proceedings of Crypto' 96, LNCS 1109,N. Koblitz, Ed., Springer-Verla
    • Paul Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems, Advances in Cryptology, Proceedings of Crypto' 96, LNCS 1109,N. Koblitz, Ed., Springer-Verlag, 1996, pp. 104-113.
    • (1996) Timing Attacks on Implementations of Diffie-Hellman , pp. 104-113
    • Kocher, P.1
  • 14
    • 84949519104 scopus 로고    scopus 로고
    • Paul Kocher, Joshua Jaffe, and Benjamin Jun, Introduction to Differential Power Analysis and Related Attacks, http://www.cryptography.com/dpa/technical, 1998.
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 15
    • 84957354181 scopus 로고
    • Speeding up elliptic cryptosystems by using a signed binary window method
    • 92, LNCS 740, pp. 345-357, Springer-Verlag, Berlin/New-Yor
    • K. Koyama, Y. Tsuruoka, Speeding up elliptic cryptosystems by using a signed binary window method, Advances in Cryptology- Proceedings of Crypto '92, LNCS 740, pp. 345-357, Springer-Verlag, Berlin/New-York, 1993.
    • (1993) Advances in Cryptology- Proceedings of Crypto
    • Koyama, K.1    Tsuruoka, Y.2
  • 18
    • 0000266095 scopus 로고
    • Speeding up the computation of an elliptic curve using addition-subtraction chains
    • F. Morain, J. Olivos. Speeding up the computation of an elliptic curve using addition-subtraction chains, Inform. Theory Appl. 24 (1990), 531-543.
    • (1990) Inform. Theory Appl , vol.24 , pp. 531-543
    • Morain, F.1    Olivos, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.