2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2016
DOI: 10.1109/ntms.2016.7792457
|View full text |Cite
|
Sign up to set email alerts
|

Inherent Resistance of Efficient ECC Designs against SCA Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

5
1

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…To avoid the successful revealing of k l-2 we implemented Algorithm 2 based on publications [12,13] i.e. we implemented a modified version of Algorithm 1.…”
Section: Our Implementation Of the Montgomery Kpmentioning
confidence: 99%
See 1 more Smart Citation
“…To avoid the successful revealing of k l-2 we implemented Algorithm 2 based on publications [12,13] i.e. we implemented a modified version of Algorithm 1.…”
Section: Our Implementation Of the Montgomery Kpmentioning
confidence: 99%
“…The modification done in Algorithm 2 in comparison to the Algorithm 1 refers to the initialization phase and the processing of k l−2 . The operation flow for processing k l−2 (see lines 2-8 in Algorithm 2) differs from the operation flow in the main loop (see lines [9][10][11][12][13][14][15][16][17]. The processing of key bit k l−2 consists of 5 multiplications, 5 squarings, 3 additions and 8 write to register operations, independent of the value of k l−2 .…”
Section: Our Implementation Of the Montgomery Kpmentioning
confidence: 99%
“…In our implementation the main loop of the algorithm consists of multiplications, squarings and additions of the GF(2 233 )-elements. The division of GF (2 233 )-elements is calculated as a sequence of field squarings and field multiplications using the little theorem of Fermat: The implemented algorithm is a modification of the Montgomery kP algorithm that is based on Algorithm 2 in [9]. This implementation allows to perform all operations in parallel to the field multiplications.…”
Section: A Structure Of the Implemented Kp Designsmentioning
confidence: 99%
“…But these countermeasures are not effective against horizontal DPA [8] attacks, i.e. against attacks analysing only one measured trace using statistical methods, for example using the difference of the mean as described in [9]. Even if each key bit is processed using exactly the same operation sequence, the data dependability can result in a successfully revealed key if horizontal DPA attacks are applied [10].…”
Section: Introductionmentioning
confidence: 99%
“…Our kP design is a balanced and efficient implementation of the kP algorithm based on Algorithm 2 published in [7], that is a modification of the Montgomery kP algorithm.…”
Section: Investigated Kp Designsmentioning
confidence: 99%