메뉴 건너뛰기




Volumn 2433, Issue , 2002, Pages 402-413

Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks

Author keywords

[No Author keywords available]

Indexed keywords

GEOMETRY; SECURITY OF DATA;

EID: 84945249400     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45811-5_31     Document Type: Conference Paper
Times cited : (36)

References (25)
  • 1
    • 84958979095 scopus 로고    scopus 로고
    • Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science
    • Bier, É., and Joye, M. Weierstraß elliptic curves and side-channel attacks. In Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 335–345.
    • Weierstraß Elliptic Curves and Side-Channel Attacks , pp. 335-345
    • Bier, É.1    Joye, M.2
  • 2
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • Boneh, D., DeMillo, R. A., and Lipton, R. J. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14 (2001), 101–119.
    • (2001) Journal of Cryptology , vol.14 , pp. 101-119
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 3
    • 85027967075 scopus 로고
    • Fast exponentiation with precomputation
    • R. A. Rueppel, Ed., vol. 658 of Lecture Notes in Computer Science
    • Brickell, E. F., Gordon, D. M., McCurley, K. S., and Wilson, D. B. Fast exponentiation with precomputation. In Advances in Cryptology–EUROCRYPT’92 (1993), R. A. Rueppel, Ed., vol. 658 of Lecture Notes in Computer Science, pp. 200–207.
    • (1993) Advances in Cryptology–EUROCRYPT’92 , pp. 200-207
    • Brickell, E.F.1    Gordon, D.M.2    McCurley, K.S.3    Wilson, D.B.4
  • 4
    • 84944905303 scopus 로고    scopus 로고
    • Universalexp onentiation algorithm–a first step towards provable SPA-resistance
    • Ç. K. Koç, D. Naccache, and C. Paar, Eds., vol. 2162 of Lecture Notes in Computer Science
    • Clavier, C., and Joye, M. Universalexp onentiation algorithm–a first step towards provable SPA-resistance. In Cryptographic Hardware and Embedded Systems–CHES 2001 (2001), Ç. K. Koç, D. Naccache, and C. Paar, Eds., vol. 2162 of Lecture Notes in Computer Science, pp. 300–308.
    • (2001) Cryptographic Hardware and Embedded Systems–CHES 2001 , pp. 300-308
    • Clavier, C.1    Joye, M.2
  • 5
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science
    • Coron, J.-S. Resistance against differential power analysis for elliptic curve cryptosystems. In Cryptographic Hardware and Embedded Systems–CHES’99 (1999), Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science, pp. 292–302.
    • (1999) Cryptographic Hardware and Embedded Systems–CHES’99 , pp. 292-302
    • Coron, J.-S.1
  • 6
    • 84945271956 scopus 로고    scopus 로고
    • Parallel scalar multiplication on general elliptic curves over Fp hedged against nondifferentialside-c hannelattac ks. Cryptology ePrint Archive Report 2002/007
    • Fischer, W., Giraud, C., Knudsen, E. W., and Jean-Pierre, S. Parallel scalar multiplication on general elliptic curves over Fp hedged against nondifferentialside-c hannelattac ks. Cryptology ePrint Archive Report 2002/007, 2002. Available from http://eprint.iacr.org/.
    • (2002)
    • Fischer, W.1    Giraud, C.2    Knudsen, E.W.3    Jean-Pierre, S.4
  • 7
    • 84945262043 scopus 로고    scopus 로고
    • IEEE stand ard specifications for public-key cryptography. IEEE Std 1363-2000
    • Institute of Electrical and Electronics Engineers (IEEE). IEEE stand ard specifications for public-key cryptography. IEEE Std 1363-2000, 2000.
    • (2000)
  • 8
    • 84949515158 scopus 로고    scopus 로고
    • Fast implementation of public-key cryptography on a DSP TMS320C6201
    • Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science
    • Itoh, K., Takenaka, M., Torii, N., Temma, S., and Kurihara, Y. Fast implementation of public-key cryptography on a DSP TMS320C6201. In Cryptographic Hardware and Embedded Systems–CHES’99 (1999), Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science, pp. 61–72.
    • (1999) Cryptographic Hardware and Embedded Systems–CHES’99 , pp. 61-72
    • Itoh, K.1    Takenaka, M.2    Torii, N.3    Temma, S.4    Kurihara, Y.5
  • 9
    • 84958955271 scopus 로고    scopus 로고
    • A fast parallel elliptic curve multiplication resistant against side channelattacks
    • D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science
    • Izu, T., and Takagi, T. A fast parallel elliptic curve multiplication resistant against side channelattacks. In Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 280–296.
    • (2002) Public Key Cryptography–PKC 2002 , pp. 280-296
    • Izu, T.1    Takagi, T.2
  • 10
    • 84945318651 scopus 로고
    • The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (2nde d.). Addison-Wesley
    • Knuth, D. E. The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (2nde d.). Addison-Wesley, 1981.
    • (1981)
    • Knuth, D.E.1
  • 11
    • 84945248936 scopus 로고    scopus 로고
    • The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (3rde d.). Addison-Wesley
    • Knuth, D. E. The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (3rde d.). Addison-Wesley, 1998.
    • (1998)
    • Knuth, D.E.1
  • 12
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science
    • Kocher, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology–CRYPTO’96 (1996), N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science, pp. 104–113.
    • (1996) Advances in Cryptology–CRYPTO’96 , pp. 104-113
    • Kocher, P.C.1
  • 13
    • 84939573910 scopus 로고    scopus 로고
    • Differentialp ower analysis
    • M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science
    • Kocher, P. C., Jaffe, J., and Jun, B. Differentialp ower analysis. In Advances in Cryptology–CRYPTO’99 (1999), M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science, pp. 388–397.
    • (1999) Advances in Cryptology–CRYPTO’99 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 14
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Ç. K. Koç and C. Paar, Eds., vol. 1965 of Lecture Notes in Computer Science
    • Messerges, T. S. Using second-order power analysis to attack DPA resistant software. In Cryptographic Hardware and Embedded Systems–CHES 2000 (2000), Ç. K. Koç and C. Paar, Eds., vol. 1965 of Lecture Notes in Computer Science, pp. 238–251.
    • (2000) Cryptographic Hardware and Embedded Systems–CHES 2000 , pp. 238-251
    • Messerges, T.S.1
  • 15
    • 84947262754 scopus 로고    scopus 로고
    • Securing elliptic curve point multiplication against side-channel attacks
    • G. I. Davida and Y. Frankel, Eds., vol. 2200 of Lecture Notes in Computer Science
    • Möller, B. Securing elliptic curve point multiplication against side-channel attacks. In Information Security–ISC 2001 (2001), G. I. Davida and Y. Frankel, Eds., vol. 2200 of Lecture Notes in Computer Science, pp. 324–334.
    • (2001) Information Security–ISC 2001 , pp. 324-334
    • Möller, B.1
  • 17
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • Montgomery, P. L. Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48 (1987), 243–264.
    • (1987) Mathematics of Computation , vol.48 , pp. 243-264
    • Montgomery, P.L.1
  • 19
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
    • B. K. Roy and E. Okamoto, Eds., vol. 1977 of Lecture Notes in Computer Science
    • Okeya, K., and Sakurai, K. Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. In Progress in Cryptology–INDOCRYPT 2000 (2000), B. K. Roy and E. Okamoto, Eds., vol. 1977 of Lecture Notes in Computer Science, pp. 178–190.
    • (2000) Progress in Cryptology–INDOCRYPT 2000 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 20
    • 84945276014 scopus 로고    scopus 로고
    • A second-order DPA attack breaks a windowmethod based countermeasure against side channelattacks
    • (these proceedings), A. H. Chan and V. Gligor, Eds
    • Okeya, K., and Sakurai, K. A second-order DPA attack breaks a windowmethod based countermeasure against side channelattacks. In Information Security–ISC 2002 (these proceedings), A. H. Chan and V. Gligor, Eds.
    • Information Security–ISC 2002
    • Okeya, K.1    Sakurai, K.2
  • 21
    • 84958960266 scopus 로고    scopus 로고
    • A combined timing and power attack
    • D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science
    • Schindler, W. A combined timing and power attack. In Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 263–279.
    • (2002) Public Key Cryptography–PKC 2002 , pp. 263-279
    • Schindler, W.1
  • 24
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing exponent digits by observing modular subtractions
    • D. Naccache, Ed., vol. 2020 of Lecture Notes in Computer Science
    • Walter, C. D., and Thompson, S. Distinguishing exponent digits by observing modular subtractions. In Progress in Cryptology–CT-RSA 2001 (2001), D. Naccache, Ed., vol. 2020 of Lecture Notes in Computer Science, pp. 192–207.
    • (2001) Progress in Cryptology–CT-RSA 2001 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2
  • 25
    • 0346395014 scopus 로고
    • On the evaluation of powers
    • Yao, A. C. -C. On the evaluation of powers. SIAM Journal on Computing 5 (1976), 100–103.
    • (1976) SIAM Journal on Computing , vol.5 , pp. 100-103
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.