2004
DOI: 10.1007/978-3-540-30191-2_23
|View full text |Cite
|
Sign up to set email alerts
|

New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The original purpose of the algorithms of [5,9] has been to provide protection against differential side-channel attacks by randomly changing the BSD representation of the secret key of elliptic curve cryptosystems. Subsequent work [4,11] has however shown that randomly changing the BSD representation of the secret key alone is not sufficient.…”
mentioning
confidence: 96%
“…The original purpose of the algorithms of [5,9] has been to provide protection against differential side-channel attacks by randomly changing the BSD representation of the secret key of elliptic curve cryptosystems. Subsequent work [4,11] has however shown that randomly changing the BSD representation of the secret key alone is not sufficient.…”
mentioning
confidence: 96%
“…However, the improved Ha-Moon algorithm has a weakness similar to the original Ha-Moon algorithm in that there are a few possible intermediate values [1,6]. After processing (k…”
Section: Weakness Of the Improved Ha-moon Algorithmmentioning
confidence: 99%
“…Besides the analysis by Walter, Oswald pointed out the security margin provided in [6] is wrong (might be lower) [8]. Sim et al [9] also analyzed the MIST algorithm with an additional assumption which is similar to the doubling attack [7]. This paper presents a multi-sequence SPA on the MIST algorithm.…”
Section: Introductionmentioning
confidence: 99%