메뉴 건너뛰기




Volumn 153, Issue , 2004, Pages 99-113

Efficient countermeasures against power analysis for elliptic curve cryptosystems

Author keywords

Countermeasure; Elliptic curve cryptosystems; Power analysis; Smart cards

Indexed keywords

ELECTRONIC CRIME COUNTERMEASURES; GEOMETRY; SMART CARDS;

EID: 84902477345     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (33)
  • 2
    • 35248871165 scopus 로고    scopus 로고
    • Zero-value Point Attacks on Elliptic Curve Cryptosystem
    • LNCS 2851, Springer-Verlag
    • T. Akishita, and T. Takagi, "Zero-value Point Attacks on Elliptic Curve Cryptosystem", ISC 2003, LNCS 2851, pp.218-233, Springer-Verlag, 2003.
    • (2003) ISC 2003 , pp. 218-233
    • Akishita, T.1    Takagi, T.2
  • 3
    • 23044482179 scopus 로고    scopus 로고
    • On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
    • LNCS 2947, Springer-Verlag
    • T. Akishita, and T. Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny", PKC 2004, LNCS 2947, pp.346-359, Springer-Verlag, 2004.
    • (2004) PKC 2004 , pp. 346-359
    • Akishita, T.1    Takagi, T.2
  • 4
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraß Elliptic Curves and Side-Channel Attacks
    • LNCS 2274, Springer-Verlag
    • E. Brier, and M. Joye, "Weierstraß Elliptic Curves and Side-Channel Attacks", PKC 2002, LNCS 2274, pp.335-345, Springer-Verlag, 2002.
    • (2002) PKC 2002 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 6
    • 84944905303 scopus 로고    scopus 로고
    • Universal exponentiation algorithm - A first step towards provable SPA-resistance-
    • LNCS 2162, Springer-Verlag
    • C. Clavier, and M. Joye, "Universal exponentiation algorithm - A first step towards provable SPA-resistance-", CHES 2001, LNCS 2162, pp. 300-308, Springer-Verlag, 2001.
    • (2001) CHES 2001 , pp. 300-308
    • Clavier, C.1    Joye, M.2
  • 7
    • 0142156711 scopus 로고    scopus 로고
    • Virtually Free Randomization Technique for Elliptic Curve Cryptography
    • LNCS 2836, Springer-Verlag
    • M. Ciet, and M. Joye, "(Virtually) Free Randomization Technique for Elliptic Curve Cryptography", ICICS 2003, LNCS 2836, pp. 348-359, Springer-Verlag, 2003.
    • (2003) ICICS 2003 , pp. 348-359
    • Ciet, M.1    Joye, M.2
  • 8
    • 84947743704 scopus 로고    scopus 로고
    • Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
    • LNCS 1514, Springer-Verlag
    • H. Cohen, A. Miyaji, and T. Ono, "Efficient Elliptic Curve Exponentiation Using Mixed Coordinates", Asiacrypt'98, LNCS 1514, pp.51-65, Springer-Verlag, 1998.
    • (1998) Asiacrypt'98 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 9
    • 35248816371 scopus 로고    scopus 로고
    • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
    • LNCS 2567, Springer-Verlag
    • L. Goubin, "A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems", PKC 2003, LNCS 2567, pp.199-210, Springer-Verlag, 2003.
    • (2003) PKC 2003 , pp. 199-210
    • Goubin, L.1
  • 10
    • 35248898400 scopus 로고    scopus 로고
    • Address-bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA
    • LNCS 2523
    • K. Itoh, T. Izu, M. Takenaka, "Address-bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA", CHES 2002, LNCS 2523, pp.129-143,2003.
    • (2003) CHES 2002 , pp. 129-143
    • Itoh, K.1    Izu, T.2    Takenaka, M.3
  • 11
    • 84974665915 scopus 로고    scopus 로고
    • Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
    • LNCS 2551, Springer-Verlag
    • T. Izu, B. Möller, and T. Takagi, "Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks", Indocrypt 2002, LNCS 2551, pp.296-313, Springer-Verlag, 2002.
    • (2002) Indocrypt 2002 , pp. 296-313
    • Izu, T.1    Möller, B.2    Takagi, T.3
  • 12
    • 84958955271 scopus 로고    scopus 로고
    • A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
    • LNCS 2274, Springer-Verlag
    • T. Izu, and T. Takagi, "A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks", PKC 2002, LNCS 2274, pp.280-296, Springer-Verlag, 2002.
    • (2002) PKC 2002 , pp. 280-296
    • Izu, T.1    Takagi, T.2
  • 13
    • 84949515158 scopus 로고    scopus 로고
    • Fast Implementation of Public-Key Cryptography on DSP TMS320C6201
    • LNCS 1717
    • K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara, "Fast Implementation of Public-Key Cryptography on DSP TMS320C6201", CHES'99, LNCS 1717, pp.61-72,1999.
    • (1999) CHES'99 , pp. 61-72
    • Itoh, K.1    Takenaka, M.2    Torii, N.3    Temma, S.4    Kurihara, Y.5
  • 14
    • 35248818852 scopus 로고    scopus 로고
    • DPA Countermeasures by Improving the Window Method
    • LNCS 2523, Springer-Verlag
    • K. Itoh, J. Yajima, M. Takenaka, and N. Torii, "DPA Countermeasures by Improving the Window Method", CHES 2002, LNCS 2523, pp.303-317, Springer-Verlag, 2003.
    • (2003) CHES 2002 , pp. 303-317
    • Itoh, K.1    Yajima, J.2    Takenaka, M.3    Torii, N.4
  • 15
    • 84944901711 scopus 로고    scopus 로고
    • Protections against Differential Analysis for Elliptic Curve Cryptography
    • Springer-Verlag, LNCS 2162
    • M. Joye, C. Tymen, "Protections against Differential Analysis for Elliptic Curve Cryptography", CHES 2001, LNCS 2162, pp.377-390, Springer-Verlag, 2001.
    • (2001) CHES 2001 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 16
    • 35248874869 scopus 로고    scopus 로고
    • The Montgomery Powering Ladder
    • LNCS 2523, Springer-Verlag
    • M. Joye, and S-M. Yen, "The Montgomery Powering Ladder", CHES 2002, LNCS 2523, pp.291-302, Springer-Verlag, 2003.
    • (2003) CHES 2002 , pp. 291-302
    • Joye, M.1    Yen, S.-M.2
  • 17
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • LNCS 1109, Springer-Verlag
    • C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", Crypto'96, LNCS 1109,pp.104-113, Springer-Verlag, 1996.
    • (1996) Crypto'96 , pp. 104-113
    • Kocher, C.1
  • 18
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • LNCS 1666, Springer-Verlag
    • C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", Crypto'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
    • (1999) Crypto'99 , pp. 388-397
    • Kocher, C.1    Jaffe, J.2    Jun, B.3
  • 19
    • 84947262754 scopus 로고    scopus 로고
    • Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
    • LNCS 2200, Springer-Verlag
    • B. Möller, "Securing Elliptic Curve Point Multiplication against Side-Channel Attacks", ISC 2001, LNCS 2200, pp.324-334, Springer-Verlag, 2001.
    • (2001) ISC 2001 , pp. 324-334
    • Möller, B.1
  • 20
    • 84945249400 scopus 로고    scopus 로고
    • Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
    • LNCS 2433, Springer-Verlag
    • B. Möller, "Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks", ISC 2002, LNCS 2433, pp.402-413, Springer-Verlag, 2002.
    • (2002) ISC 2002 , pp. 402-413
    • Möller, B.1
  • 21
    • 84968484435 scopus 로고
    • Speeding the Pollard and Elliptic Curve Methods for Factorizations
    • P. Montgomery, "Speeding the Pollard and Elliptic Curve Methods for Factorizations", Math. of Comp, vol.48, pp.243-264, 1987.
    • (1987) Math. of Comp , vol.48 , pp. 243-264
    • Montgomery, P.1
  • 22
    • 84949514743 scopus 로고    scopus 로고
    • Power Analysis Attacks of Modular Exponentiation in Smartcards
    • LNCS 1717, Springer-Verlag
    • T. Messerges, E. Dabbish, and R. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", CHES'99, LNCS 1717, pp. 144-157, Springer-Verlag, 1999.
    • (1999) CHES'99 , pp. 144-157
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 24
    • 84902467415 scopus 로고    scopus 로고
    • Recommended Elliptic Curves for Federal Government Use, in the appendix of FIPS 186-2, National Institute of Standards and Technology (NIST)
    • Recommended Elliptic Curves for Federal Government Use, in the appendix of FIPS 186-2, National Institute of Standards and Technology (NIST).
  • 25
    • 84944889933 scopus 로고    scopus 로고
    • Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
    • LNCS 2162, Springer-Verlag
    • E. Oswald, and M. Aigner, "Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks", CHES 2001, LNCS 2162, pp.39-50, Springer-Verlag, 2001.
    • (2001) CHES 2001 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 26
    • 22844456588 scopus 로고    scopus 로고
    • Elliptic curves with the Montgomery form and their cryptographic applications
    • LNCS 1751, Springer-Verlag
    • K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic curves with the Montgomery form and their cryptographic applications", PKC 2000, LNCS 1751, pp.446-465, Springer-Verlag, 2000.
    • (2000) PKC 2000 , pp. 446-465
    • Okeya, K.1    Kurumatani, H.2    Sakurai, K.3
  • 27
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystem even secure against the timing attack
    • LNCS 1977, Springer-Verlag
    • K. Okeya, and K. Sakurai, "Power analysis breaks elliptic curve cryptosystem even secure against the timing attack", Indocrypt 2000, LNCS 1977, pp. 178-190, Springer-Verlag, 2000.
    • (2000) Indocrypt 2000 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 28
    • 84947425601 scopus 로고    scopus 로고
    • On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
    • LNCS 2384, Springer-Verlag
    • K. Okeya, and K. Sakurai, "On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling", ACISP 2002, LNCS 2384, pp.420-435, Springer-Verlag, 2002.
    • (2002) ACISP 2002 , pp. 420-435
    • Okeya, K.1    Sakurai, K.2
  • 29
    • 84939214123 scopus 로고    scopus 로고
    • A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks
    • to appear in the
    • K. Okeya, and K. Sakurai, "A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks", to appear in the proceedings of 2003 IEEE Information Theory Workshop.
    • Proceedings of 2003 IEEE Information Theory Workshop
    • Okeya, K.1    Sakurai, K.2
  • 30
    • 35248865717 scopus 로고    scopus 로고
    • The Width-w NAF Method Provides Small Memory
    • LNCS 2612, Springer-Verlag
    • K. Okeya, and T. Takagi, "The Width-w NAF Method Provides Small Memory", CT-RSA 2003, LNCS 2612, pp.328-342, Springer-Verlag, 2003.
    • (2003) CT-RSA 2003 , pp. 328-342
    • Okeya, K.1    Takagi, T.2
  • 31
    • 35248826949 scopus 로고    scopus 로고
    • A More Flexible Countermeasure against Side Channel Attacks using Window Method
    • LNCS 2779, Springer-Verlag
    • K. Okeya, and T. Takagi, "A More Flexible Countermeasure against Side Channel Attacks using Window Method", CHES 2003, LNCS 2779, pp. 397-410 Springer-Verlag, 2003.
    • (2003) CHES 2003 , pp. 397-410
    • Okeya, K.1    Takagi, T.2
  • 32
    • 35248821153 scopus 로고    scopus 로고
    • An Analysis of Goubin's Refined Power Analysis Attack
    • LNCS 2779, Springer-Verlag
    • N. Smart, "An Analysis of Goubin's Refined Power Analysis Attack", CHES 2003, LNCS 2779, pp.281-290, Springer-Verlag, 2003.
    • (2003) CHES 2003 , pp. 281-290
    • Smart, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.