메뉴 건너뛰기




Volumn 2162, Issue , 2001, Pages 377-390

Protections against differential analysis for elliptic curve cryptography: An algebraic approach

Author keywords

Differential power analysis (DPA); Elliptic curves; Public key cryptography; Side channel attacks; Smart cards; Timing attacks

Indexed keywords

EMBEDDED SYSTEMS; GEOMETRY; PUBLIC KEY CRYPTOGRAPHY; SMART CARDS;

EID: 84944901711     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44709-1_31     Document Type: Conference Paper
Times cited : (145)

References (14)
  • 2
    • 0000267548 scopus 로고
    • Sequences of numbers generated by addition in formal groups and new primality and factorization tests
    • 7
    • D.V. Chudnovsky and G.V. Chudnovsky. Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Math., 7:385-434, 1986/7.
    • (1986) Advances in Applied Math , vol.7 , pp. 385-434
    • Chudnovsky, D.V.1    Chudnovsky, G.V.2
  • 3
    • 0003705361 scopus 로고
    • A Course in Computational Algebraic Number Theory
    • Springer-Verlag
    • Henri Cohen. A Course in Computational Algebraic Number Theory. Number 138 in Graduate Texts in Mathematics. Springer-Verlag, 1993.
    • (1993) Number 138 in Graduate Texts in Mathematics
    • Cohen, H.1
  • 6
    • 0000490812 scopus 로고    scopus 로고
    • A survey on fast exponentiation methods
    • Daniel M. Gordon. A survey on fast exponentiation methods. Journal of Algorithms, 27:129-146, 1998.
    • (1998) Journal of Algorithms , vol.27 , pp. 129-146
    • Gordon, D.M.1
  • 7
    • 68549092452 scopus 로고    scopus 로고
    • Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems
    • Ç.K. Koç and C. Paar, editors, Springer-Verlag
    • M. Anwar Hasan. Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems. In Ç.K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 93-108. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems-Ches 2000, Volume 1965 of Lecture Notes in Computer Science , pp. 93-108
    • Anwar Hasan, M.1
  • 8
    • 85024567680 scopus 로고
    • CM-curves with good cryptographic protocols
    • Neal Koblitz, J. Feigenbaum, editor, Springer-Verlag
    • Neal Koblitz. CM-curves with good cryptographic protocols. In J. Feigenbaum, editor, Advances in Cryptology-CRYPTO’91, volume 576 of Lecture Notes in Computer Science, pages 279-287. Springer-Verlag, 1992.
    • (1992) Advances in Cryptology-CRYPTO’91, Volume 576 of Lecture Notes in Computer Science , pp. 279-287
  • 10
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • N. Koblitz, editor, Springer-Verlag
    • Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology-CRYPTO’96, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer-Verlag, 1996.
    • (1996) Advances in Cryptology-CRYPTO’96, Volume 1109 of Lecture Notes in Computer Science , pp. 104-113
    • Kocher, P.C.1
  • 14
    • 84958649729 scopus 로고    scopus 로고
    • Solinas. An improved algorithm for arithmetic on a family of elliptic curves
    • B. Kaliski, editor, Springer-Verlag
    • Jerome A. Solinas. An improved algorithm for arithmetic on a family of elliptic curves. In B. Kaliski, editor, Advances in Cryptology-CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 357-371. Springer-Verlag, 1997.
    • (1997) Advances in Cryptology-CRYPTO’97, Volume 1294 of Lecture Notes in Computer Science , pp. 357-371
    • Jerome, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.