메뉴 건너뛰기




Volumn 2551, Issue , 2002, Pages 296-313

Improved elliptic curve multiplication methods resistant against side channel attacks

Author keywords

Elliptic curve cryptosystems; Memory constraints; Scalar multiplication; Side channel attacks; Window method

Indexed keywords

GEOMETRY;

EID: 84974665915     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36231-2_24     Document Type: Conference Paper
Times cited : (60)

References (35)
  • 1
    • 84974660062 scopus 로고    scopus 로고
    • Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)
    • ANSI X9.62-1998, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1998.
    • (1998)
  • 2
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraß Elliptic Curves and Side-Channel Attacks
    • Springer-Verlag
    • E. Brier and M. Joye, “Weierstraß Elliptic Curves and Side-Channel Attacks”, PKC 2002, LNCS 2274, pp. 335–345, Springer-Verlag, 2002.
    • (2002) PKC 2002, LNCS , vol.2274 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 3
    • 84944905303 scopus 로고    scopus 로고
    • Universal exponentiation algorithm–A first step towards provable SPA-resistance–
    • C. Clavier and M. Joye, “Universal exponentiation algorithm–A first step towards provable SPA-resistance–”, CHES 2001, LNCS 2162, pp. 300–308, 2001.
    • (2001) CHES 2001, LNCS , vol.2162 , pp. 300-308
    • Clavier, C.1    Joye, M.2
  • 4
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • H. Cohen, A. Miyaji and T. Ono, “Efficient elliptic curve exponentiation using mixed coordinates”, ASIACRYPT’98, LNCS 1514, pp. 51–65, 1998.
    • (1998) ASIACRYPT’98, LNCS , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 5
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • J. Coron, “Resistance against differential power analysis for elliptic curve cryptosystems”, CHES’99, LNCS 1717, pp. 292–302, 1999.
    • (1999) CHES’99, LNCS , vol.1717 , pp. 292-302
    • Coron, J.1
  • 6
    • 84949515158 scopus 로고    scopus 로고
    • Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201
    • K. Itoh, et al. “Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201”, CHES’99, LNCS 1717, pp. 61–72, 1999.
    • (1999) CHES’99, LNCS , vol.1717 , pp. 61-72
    • Itoh, K.1
  • 7
    • 35248835491 scopus 로고    scopus 로고
    • DPA Countermeasures by improving the Window Method
    • K. Itoh, J. Yajima, M. Takenaka, and N. Torii, “DPA Countermeasures by improving the Window Method”, to appear in CHES 2002, 2002
    • (2002) CHES 2002
    • Itoh, K.1    Yajima, J.2    Takenaka, M.3    Torii, N.4
  • 8
    • 84958955271 scopus 로고    scopus 로고
    • A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
    • T. Izu and T. Takagi, “A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks”, PKC 2002, LNCS 2274, pp. 280–296, 2002.
    • (2002) PKC 2002, LNCS , vol.2274 , pp. 280-296
    • Izu, T.1    Takagi, T.2
  • 11
    • 84944884283 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • M. Joye and J. Quisquater, “Hessian elliptic curves and side-channel attacks”, CHES 2001, LNCS 2162, pp. 402–410, 2001.
    • (2001) CHES 2001, LNCS , vol.2162 , pp. 402-410
    • Joye, M.1    Quisquater, J.2
  • 12
    • 84944901711 scopus 로고    scopus 로고
    • Protections against differential analysis for elliptic curve cryptography
    • M. Joye and C. Tymen, “Protections against differential analysis for elliptic curve cryptography”, CHES 2001, LNCS 2162, pp. 377–390, 2001.
    • (2001) CHES 2001, LNCS , vol.2162 , pp. 377-390
    • Joye, M.1    Tymen, C.2
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attackson Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • C. Kocher, “Timing Attackson Implementations of Diffie-Hellman, RSA, DSS, and Other Systems”, CRYPTO’96, LNCS 1109, pp. 104–113, 1996.
    • (1996) CRYPTO’96, LNCS , vol.1109 , pp. 104-113
    • Kocher, C.1
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • C. Kocher, J. Jaffe and B. Jun, “Differential power analysis”, CRYPTO’99, LNCS 1666, pp. 388–397, 1999.
    • (1999) CRYPTO’99, LNCS , vol.1666 , pp. 388-397
    • Kocher, C.1    Jaffe, J.2    Jun, B.3
  • 15
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the Jacobi form
    • P. Liardet and N. Smart, “Preventing SPA/DPA in ECC systems using the Jacobi form”, CHES 2001, LNCS 2162, pp. 391–401, 2001.
    • (2001) CHES 2001, LNCS , vol.2162 , pp. 391-401
    • Liardet, P.1    Smart, N.2
  • 17
    • 84947262754 scopus 로고    scopus 로고
    • Securing elliptic curve point multiplication against side-channel attacks
    • Springer-Verlag
    • B. Möller, “Securing elliptic curve point multiplication against side-channel attacks”, ISC 2001, LNCS 2200. pp. 324-334, Springer-Verlag, 2001.
    • (2001) ISC 2001, LNCS 2200 , pp. 324-334
    • Möller, B.1
  • 18
    • 84947262754 scopus 로고    scopus 로고
    • Securing elliptic curve point multiplication against side-channel attacks
    • B. Möller, “Securing elliptic curve point multiplication against side-channel attacks”, Addendum: efficiency improvement, http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/ecc-sca-isc01.pdf, 2001.
    • (2001) Addendum: Efficiency Improvement
    • Möller, B.1
  • 19
    • 84945249400 scopus 로고    scopus 로고
    • Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks
    • B. Möller, “Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks”, ISC 2002, LNCS 2433. pp. 402-413, 2002.
    • (2002) ISC 2002, LNCS , vol.2433 , pp. 402-413
    • Möller, B.1
  • 20
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methodsfor factorizations
    • P. Montgomery, “Speeding the Pollard and elliptic curve methodsfor factorizations”, Math. Comp., vol. 48, pp. 243–264, 1987.
    • (1987) Math. Comp , vol.48 , pp. 243-264
    • Montgomery, P.1
  • 21
    • 84974722236 scopus 로고    scopus 로고
    • Recommended Elliptic Curvesfor Federal Government Use, Appendix to FIPS 186-2
    • National Institute of Standards and Technology, Recommended Elliptic Curvesfor Federal Government Use, Appendix to FIPS 186-2, 2000.
    • (2000)
  • 22
    • 84944889933 scopus 로고    scopus 로고
    • Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
    • E. Oswald, M. Aigner, “Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks”, CHES 2001, LNCS 2162, pp. 39-50, 2001.
    • (2001) CHES 2001, LNCS , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 24
    • 84949949652 scopus 로고    scopus 로고
    • A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery form Elliptic Curve Secure against Side Channel Attacks
    • Springer-Verlag
    • K. Okeya, K. Miyazaki, and K. Sakurai, “A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery form Elliptic Curve Secure against Side Channel Attacks”, ICISC 2001, LNCS 2288, pp.428-439, Springer-Verlag, 2002.
    • (2002) ICISC 2001, LNCS , vol.2288 , pp. 428-439
    • Okeya, K.1    Miyazaki, K.2    Sakurai, K.3
  • 25
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
    • Springer-Verlag
    • K. Okeya and K. Sakurai, “Power analysis breaks elliptic curve cryptosystems even secure against the timing attack”, INDOCRYPT 2000, LNCS 1977, pp. 178–190, Springer-Verlag, 2000.
    • (2000) INDOCRYPT 2000, LNCS 1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 26
    • 84944875437 scopus 로고    scopus 로고
    • Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve
    • Springer-Verlag
    • K. Okeya and K. Sakurai, “Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve”, CHES 2001, LNCS 2162, pp. 126–141, Springer-Verlag, 2001.
    • (2001) CHES 2001, LNCS , vol.2162 , pp. 126-141
    • Okeya, K.1    Sakurai, K.2
  • 27
    • 84947425601 scopus 로고    scopus 로고
    • On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
    • K. Okeya, and K. Sakurai, “On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling”, ACISP 2002, LNCS 2384, pp. 420–435, 2002.
    • (2002) ACISP 2002, LNCS , vol.2384 , pp. 420-435
    • Okeya, K.1    Sakurai, K.2
  • 28
    • 84945314413 scopus 로고    scopus 로고
    • A Second-Order DPA Attack Breaksa Windowmethod based Countermeasure against Side Channel Attacks
    • K. Okeya, and K. Sakurai, “A Second-Order DPA Attack Breaksa Windowmethod based Countermeasure against Side Channel Attacks”, ISC 2002, LNCS 2433, pp. 389–401, 2002.
    • (2002) ISC 2002, LNCS , vol.2433 , pp. 389-401
    • Okeya, K.1    Sakurai, K.2
  • 29
    • 84958960266 scopus 로고    scopus 로고
    • A Combined Timing and Power Attack
    • Springer-Verlag
    • W. Schindler, “A Combined Timing and Power Attack”, PKC 2002, LNCS 2274, pp. 263–279, Springer-Verlag, 2002.
    • (2002) PKC 2002, LNCS , vol.2274 , pp. 263-279
    • Schindler, W.1
  • 30
    • 85027140454 scopus 로고    scopus 로고
    • DPA-Gegenmaßnahmen bei einer ECDSA-Implementierung auf Chipkarten
    • M. Seysen, “DPA-Gegenmaßnahmen bei einer ECDSA-Implementierung auf Chipkarten”, presented at DPA Workshop, Bonn (BSI), ECC Brainpool, 2001.
    • (2001) DPA Workshop, Bonn (BSI), ECC Brainpool
    • Seysen, M.1
  • 31
    • 84974693569 scopus 로고    scopus 로고
    • SEC 1: Elliptic Curve Cryptography, Version 1.0
    • Standards for Efficient Cryptography Group/Certicom Research, SEC 1: Elliptic Curve Cryptography, Version 1.0, 2000. Available from http://www.secg.org/.
    • (2000)
  • 32
    • 84974660053 scopus 로고    scopus 로고
    • SEC 2: Recommended Elliptic Curve Cryptography Domain Parameters, Version 1.0
    • Standardsf or Efficient Cryptography Group/Certicom Research, SEC 2: Recommended Elliptic Curve Cryptography Domain Parameters, Version 1.0, 2000.
    • (2000)
  • 33
    • 84974668057 scopus 로고    scopus 로고
    • Smart Cards–Requirements, Properties and Applications–
    • K. Vedder and F. Weikmann, “Smart Cards–Requirements, Properties and Applications–”, Chipkarten, Vieweg, pp. 1-23, 1998.
    • (1998) Chipkarten, Vieweg , pp. 1-23
    • Vedder, K.1    Weikmann, F.2
  • 34
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing Exponent Digits by Observing Modular Subtractions
    • C. D. Walter and S. Thompson, “Distinguishing Exponent Digits by Observing Modular Subtractions”, CT-RSA 2001, LNCS 2020, pp. 192–207, 2001.
    • (2001) CT-RSA 2001, LNCS , vol.2020 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2
  • 35
    • 0842283870 scopus 로고    scopus 로고
    • Breaking the Liardet-Smart Randomized Exponentiation Algorithm
    • C.D. Walter, “Breaking the Liardet-Smart Randomized Exponentiation Algorithm”, to appear in CARDIS’02.
    • CARDIS’02
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.