2006
DOI: 10.1093/ietfec/e89-a.8.2207
|View full text |Cite
|
Sign up to set email alerts
|

Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…Algorithm 5 has a very similar structure with the methods in [12]. Actually, the only difference between them lies in the usage of the Frobenius map in algorithm 5 instead of the point doubling map in [12].…”
Section: L-r Versionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Algorithm 5 has a very similar structure with the methods in [12]. Actually, the only difference between them lies in the usage of the Frobenius map in algorithm 5 instead of the point doubling map in [12].…”
Section: L-r Versionsmentioning
confidence: 99%
“…First, [12] proposed new random point blinding methods by using the simple observation that While their methods are directly applicable to Koblitz curves as well, this paper uses the specific properties of Koblitz curves to get more efficient power attack countermeasures. Second, [10] proposed several power attack countermeasures specifically applicable for Koblitz curve cryptosystems, which include the SPA countermeasures and the DPA countermeasures.…”
Section: Introductionmentioning
confidence: 99%
“…The overhead of the proposed countermeasure is just 0.5nM for the η T pairing over F 3 n . This method is similar to the randomized linearly transformed coordinate (RLC) method for ECC [11,17] although RLC is a relatively slow countermeasure against SCAs. However, our method is a very efficient countermeasure for the η T pairing.…”
Section: Introductionmentioning
confidence: 99%