2005
DOI: 10.1007/11506157_19
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(26 citation statements)
references
References 15 publications
0
26
0
Order By: Relevance
“…These include, e.g., regular w-NAF and m-ary methods [20,34,40,45,51], regular width-w τ -adic NAF method for Koblitz curves [46], the regular signed-digit comb methods [21,30], and scalar multiplications on curves with fast endomorphisms that use multiscalar multiplications with precomputations (e.g., GLV [24] and GLS [23] methods and, in particular, the recent regular algorithm [19]). Some of these methods have been recently utilized in lightweight ECC implementations to achieve protection against single-trace attacks: e.g., [30] was used in [47], [46] in [48], and [19] in [14]. All deterministic countermeasures inside Ψ such as atomicity of point addition and point doubling, unified addition formulae, etc., do not work against the attack and are, thus, also in the list of vulnerable methods when used in a scalar multiplication algorithm that utilizes precomputations in the above sense.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…These include, e.g., regular w-NAF and m-ary methods [20,34,40,45,51], regular width-w τ -adic NAF method for Koblitz curves [46], the regular signed-digit comb methods [21,30], and scalar multiplications on curves with fast endomorphisms that use multiscalar multiplications with precomputations (e.g., GLV [24] and GLS [23] methods and, in particular, the recent regular algorithm [19]). Some of these methods have been recently utilized in lightweight ECC implementations to achieve protection against single-trace attacks: e.g., [30] was used in [47], [46] in [48], and [19] in [14]. All deterministic countermeasures inside Ψ such as atomicity of point addition and point doubling, unified addition formulae, etc., do not work against the attack and are, thus, also in the list of vulnerable methods when used in a scalar multiplication algorithm that utilizes precomputations in the above sense.…”
Section: Preliminariesmentioning
confidence: 99%
“…Nevertheless, direct use of, e.g., w-NAF still leaks a lot of information about the scalar and cannot be considered side-channel secure. Fully regular patterns of operations can be achieved with atomic scalar multiplication algorithms with precomputations which typically combine side-channel security with efficiency (see, e.g., [19,30,45,46]). Such algorithms have been recently used for side-channel protected lightweight hardware implementations, e.g., in [47,48] as well as fast software, e.g., in [14].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, applied to the countermeasures in [14], the N-1 attack can work only if the randomization factor doesn't vary during the computation, which is not the case for the new countermeasures.…”
Section: [0]mentioning
confidence: 99%
“…Some of these remarkable techniques include the simple power analysis attack (SPA) and the differential power analysis attack (DPA) [9], which are suitably applicable to ECC realizations. Fortunately, many researchers proposed elegant countermeasures against these power attacks [9], [10]- [14], and we briefly review some of those which are related to our proposals.…”
Section: Introductionmentioning
confidence: 99%
“…The first step in improving precomputations is to utilize the fact that the same inversion is computed in both P 1 + P 2 and P 1 − P 2 computations. The same fact has been previously used at least in [20] but it is shown in the following that it is also possible to save some additions.…”
Section: Precomputationmentioning
confidence: 84%