메뉴 건너뛰기




Volumn 2271, Issue , 2002, Pages 53-66

MIST: An efficient, randomized exponentiation algorithm for resisting power analysis

Author keywords

Addition chains; Blinding; Division chains; DPA; Mist exponentiation algorithm; Power analysis; Smart card

Indexed keywords

EMBEDDED SYSTEMS; SMART CARDS;

EID: 84944889837     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45760-7_5     Document Type: Conference Paper
Times cited : (50)

References (12)
  • 1
    • 84944905303 scopus 로고    scopus 로고
    • Universal Exponentiation Algorithm, Cryptographic Hardware and Embedded Systems – CHES 2001
    • Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • C. Clavier & M. Joye, Universal Exponentiation Algorithm, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 300–308.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 300-308
    • Clavier, C.1    Joye, M.2
  • 2
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems – CHES 2001
    • Ç. Koç, D. Naccache & C. Paar (editors), Springer- Verlag
    • K. Gandolfi, C. Mourtel & F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer- Verlag, 2001, 251–261.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 3
    • 0003340059 scopus 로고
    • The Art of Computer Programming
    • Edition, Addison-Wesley
    • D. E. Knuth, The Art of Computer Programming, vol. 2, “Seminumerical Algorithms”, 2nd Edition, Addison-Wesley, 1981, 441–466.
    • (1981) Seminumerical Algorithms , vol.2 , pp. 441-466
    • Knuth, D.E.1
  • 4
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attack on Implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology – Crypto’96
    • N. Koblitz (editor), Springer-Verlag
    • P. Kocher, Timing Attack on Implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology – Crypto’96, N. Koblitz (editor), Lecture Notes in Computer Science, 1109, Springer-Verlag, 1996, 104–113.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 5
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis, Advances in Cryptology – Crypto’99
    • M. Wiener (editor), Springer-Verlag
    • P. Kocher, J. Jaffe & B. Jun, Differential Power Analysis, Advances in Cryptology – Crypto’99, M. Wiener (editor), Lecture Notes in Computer Science, 1666, Springer-Verlag, 1999, 388–397.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 6
    • 84944906595 scopus 로고    scopus 로고
    • Random Register Renaming to Foil DPA, Cryptographic Hardware and Embedded Systems – CHES 2001
    • Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • D. May, H.L. Muller & N.P. Smart, Random Register Renaming to Foil DPA, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 28–38.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 28-38
    • May, D.1    Muller, H.L.2    Smart, N.P.3
  • 7
    • 84949514743 scopus 로고    scopus 로고
    • Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems (Proc CHES 99)
    • C. Paar & Ç. Koç (editors), Springer-Verlag
    • T. S. Messerges, E. A. Dabbish & R. H. Sloan, Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems (Proc CHES 99), C. Paar & Ç. Koç (editors), Lecture Notes in Computer Science, 1717, Springer-Verlag, 1999, 144–157.
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 8
    • 84944889933 scopus 로고    scopus 로고
    • Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems – CHES 2001
    • Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • E. Oswald & M. Aigner, Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 39–50.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 9
    • 0032118606 scopus 로고    scopus 로고
    • Exponentiation using Division Chains
    • July
    • C. D. Walter, Exponentiation using Division Chains, IEEE Transactions on Computers, 47, No. 7, July 1998, 757–765.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.7 , pp. 757-765
    • Walter, C.D.1
  • 10
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing Exponent Digits by Observing Modular Subtractions, Topics in Cryptology − CT-RSA 2001
    • D. Naccache (editor), Springer-Verlag
    • C. D. Walter & S. Thompson, Distinguishing Exponent Digits by Observing Modular Subtractions, Topics in Cryptology − CT-RSA 2001, D. Naccache (editor), Lecture Notes in Computer Science, 2020, Springer-Verlag, 2001, 192–207.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2
  • 11
    • 84944888189 scopus 로고    scopus 로고
    • Sliding Windows succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems – CHES 2001
    • Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
    • C. D. Walter, Sliding Windows succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 286–299.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 286-299
    • Walter, C.D.1
  • 12
    • 84944900219 scopus 로고    scopus 로고
    • Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli, Topics in Cryptology − CT-RSA 2002
    • B. Preneel (editor),, Springer-Verlag, This Volume
    • C. D. Walter, Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli, Topics in Cryptology − CT-RSA 2002, B. Preneel (editor), Lecture Notes in Computer Science, 2271, Springer-Verlag, 2002, 30–39, This Volume.
    • (2002) Lecture Notes in Computer Science , vol.2271 , pp. 30-39
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.