메뉴 건너뛰기




Volumn 1965 LNCS, Issue , 2000, Pages 293-301

Montgomery exponentiation with no final subtractions: Improved results

Author keywords

Modular exponentiation; Montgomery multiplication; Power attacks; Smart cards; Timing attacks

Indexed keywords

SIDE CHANNEL ATTACK; SMART CARDS;

EID: 85099426875     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44499-8_23     Document Type: Conference Paper
Times cited : (8)

References (18)
  • 1
    • 33745470162 scopus 로고
    • ARM, August, Document number: ARM DDI 0029E
    • ARM. ARM 7TDMI Data Sheet, August 1995. Document number: ARM DDI 0029E.
    • (1995) ARM 7TDMI Data Sheet
  • 3
    • 85034497704 scopus 로고
    • Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor
    • A. M. Odlyzko, editor, Advances in Cryptology, CRYPTO '86, of, Springer-Verlag
    • P. Barrett. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In A. M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of LNCS, pages 311-323. Springer-Verlag, 1987.
    • (1987) LNCS , vol.263 , pp. 311-323
    • Barrett, P.1
  • 7
  • 8
    • 0027606916 scopus 로고
    • Hardware Implementation of Montgomery's Modular Multiplication Algorithm
    • June
    • Stephen E. Eldridge and Colin D. Walter. Hardware Implementation of Montgomery's Modular Multiplication Algorithm. IEEE Transactions on Computers, 42(6):693-699, June 1993.
    • (1993) IEEE Transactions on Computers , vol.42 , Issue.6 , pp. 693-699
    • Eldridge, S.E.1    Walter, C.D.2
  • 9
    • 0038800541 scopus 로고    scopus 로고
    • Timing Attack: What Can Be Achieved by a Powerful Adversary?
    • A. Barbé, E.C. van der Meulen, and P. Vanroose, editors, May
    • Gael Hachez, François Koeune, and Jean-Jacques Quisquater. Timing Attack: What Can Be Achieved by a Powerful Adversary? In A. Barbé, E.C. van der Meulen, and P. Vanroose, editors, The 20th symposium on Information Theory in the Benelux, pages 63-70, May 1999.
    • (1999) The 20th symposium on Information Theory in the Benelux , pp. 63-70
    • Hachez, G.1    Koeune, F.2    Quisquater, J.-J.3
  • 10
    • 84949515158 scopus 로고    scopus 로고
    • Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, and Yasushi Kurihara. Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, 1717 of LNCS, pages 61-72. Springer-Verlag, August 1999.
    • Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, and Yasushi Kurihara. Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, volume 1717 of LNCS, pages 61-72. Springer-Verlag, August 1999.
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attack on Implementations of Diffe-Hellman, RSA, DSS and other systems
    • Neil Kobliz, editor, Advances in Cryptology, CRYPTO '96, of, Springer-Verlag, August
    • Paul Kocher. Timing Attack on Implementations of Diffe-Hellman, RSA, DSS and other systems. In Neil Kobliz, editor, Advances in Cryptology - CRYPTO '96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, August 1996.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 12
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • M. Wiener, editor, Advances in Cryptology, CRYPTO '99, of, Springer-Verlag, August
    • Paul Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 388-397. Springer-Verlag, August 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 13
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis Attack of Modular Exponentiation in Smartcards
    • Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems, CHES '99, of, Springer-Verlag, August
    • Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. Power analysis Attack of Modular Exponentiation in Smartcards. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, volume 1717 of LNCS, pages 144-157. Springer-Verlag, August 1999.
    • (1999) LNCS , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 14
    • 84966243285 scopus 로고
    • Modular Multiplication Without Trial Division
    • April
    • Peter L. Montgomery. Modular Multiplication Without Trial Division. Mathematics of Computation, 44(170):519-521, April 1985.
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 15
    • 68549130910 scopus 로고    scopus 로고
    • Jean-Jacques Quisquater. Procédé de Codage selon la Méthode dite RSA, par unMicrocontr^oleur et Dispositifs Utilisant ce Procédé. Demande de brevet français.(Dépǒt numéro: 90 02274), February 1990.
    • Jean-Jacques Quisquater. Procédé de Codage selon la Méthode dite RSA, par unMicrocontr^oleur et Dispositifs Utilisant ce Procédé. Demande de brevet français.(Dépǒt numéro: 90 02274), February 1990.
  • 16
    • 27244438216 scopus 로고
    • Encoding System According to the So-called RSA Method, by Means of a Microcontroller and Arrangement Implementing this System
    • U.S. Patent 5,166,978, November
    • Jean-Jacques Quisquater. Encoding System According to the So-called RSA Method, by Means of a Microcontroller and Arrangement Implementing this System. U.S. Patent 5,166,978, November 1992.
    • (1992)
    • Quisquater, J.-J.1
  • 17
    • 0033204468 scopus 로고    scopus 로고
    • Needs no Final Subtractions
    • October
    • Colin D. Walter. Montgomery Exponentiation Needs no Final Subtractions. Electronics Letters, 35(21):1831-1832, October 1999.
    • (1999) Electronics Letters , vol.35 , Issue.21 , pp. 1831-1832
    • Walter, C.D.1    Exponentiation, M.2
  • 18
    • 84949504956 scopus 로고    scopus 로고
    • Montgomery's Multiplication Technique: How to Make It Smaller and Faster
    • Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems, CHES '99, of, Springer-Verlag, August
    • Colin D. Walter. Montgomery's Multiplication Technique: How to Make It Smaller and Faster. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, volume 1717 of LNCS, pages 80-93. Springer-Verlag, August 1999.
    • (1999) LNCS , vol.1717 , pp. 80-93
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.