TY - GEN
T1 - Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
AU - Okeya, Katsuyuki
AU - Sakurai, Kouichi
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2000.
PY - 2000
Y1 - 2000
N2 - We apply power analysis on known elliptic curve cryptosystems, and consider an exact implementation of scalar multiplication on elliptic curves for resisting against power attacks. Our proposed algorithm does not decrease the computational performance compared to the conventional scalar multiplication algorithm, whereas previous methods did cost the performance or fail to protect against power analysis attacks.
AB - We apply power analysis on known elliptic curve cryptosystems, and consider an exact implementation of scalar multiplication on elliptic curves for resisting against power attacks. Our proposed algorithm does not decrease the computational performance compared to the conventional scalar multiplication algorithm, whereas previous methods did cost the performance or fail to protect against power analysis attacks.
UR - http://www.scopus.com/inward/record.url?scp=84947733936&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84947733936&partnerID=8YFLogxK
U2 - 10.1007/3-540-44495-5_16
DO - 10.1007/3-540-44495-5_16
M3 - Conference contribution
AN - SCOPUS:84947733936
SN - 3540414525
SN - 9783540414520
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 178
EP - 190
BT - Progress in Cryptology - INDOCRYPT 2000 - 1st International Conference in Cryptology in India, Proceedings
A2 - Roy, Bimal
A2 - Okamoto, Eiji
PB - Springer Verlag
T2 - 1st International Conference in Cryptology in India, INDOCRYPT 2000
Y2 - 10 December 2000 through 13 December 2000
ER -