Improved elliptic curve multiplication methods resistant against side channel attacks

Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Citations (Scopus)

Abstract

We improve several elliptic curve multiplication algorithms secure against side channel attacks (SCA). While some efficient SCA resistant algorithms were developed that apply only to special classes of curves, we are interested in algorithms that are suitable for general elliptic curves and can be applied to the recommended curves found in various standards. We compare the running time and memory usage of the improved schemes.

Original languageEnglish
Title of host publicationProgress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings
EditorsAlfred Menezes, Palash Sarkar
PublisherSpringer Verlag
Pages296-313
Number of pages18
ISBN (Print)9783540362319
DOIs
Publication statusPublished - 2002
Event3rd International Conference on Cryptology in India, INDOCRYPT 2002 - Hyderabad, India
Duration: Dec 16 2002Dec 18 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2551
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Cryptology in India, INDOCRYPT 2002
CountryIndia
CityHyderabad
Period12/16/0212/18/02

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Improved elliptic curve multiplication methods resistant against side channel attacks'. Together they form a unique fingerprint.

  • Cite this

    Izu, T., Möller, B., & Takagi, T. (2002). Improved elliptic curve multiplication methods resistant against side channel attacks. In A. Menezes, & P. Sarkar (Eds.), Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings (pp. 296-313). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2551). Springer Verlag. https://doi.org/10.1007/3-540-36231-2_24