Defeating simple power analysis on Koblitz curves

Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi

研究成果: ジャーナルへの寄稿記事

5 引用 (Scopus)

抄録

Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.

元の言語英語
ページ(範囲)1362-1369
ページ数8
ジャーナルIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E89-A
発行部数5
DOI
出版物ステータス出版済み - 5 2006

Fingerprint

Power Analysis
Side Channel Attacks
Curve
Scalar multiplication
Countermeasures
Binary
Side channel attack

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Applied Mathematics
  • Electrical and Electronic Engineering

これを引用

Defeating simple power analysis on Koblitz curves. / Vuillaume, Camille; Okeya, Katsuyuki; Takagi, Tsuyoshi.

:: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 巻 E89-A, 番号 5, 05.2006, p. 1362-1369.

研究成果: ジャーナルへの寄稿記事

Vuillaume, Camille ; Okeya, Katsuyuki ; Takagi, Tsuyoshi. / Defeating simple power analysis on Koblitz curves. :: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2006 ; 巻 E89-A, 番号 5. pp. 1362-1369.
@article{84da717430b542bb9b853ab33538160f,
title = "Defeating simple power analysis on Koblitz curves",
abstract = "Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.",
author = "Camille Vuillaume and Katsuyuki Okeya and Tsuyoshi Takagi",
year = "2006",
month = "5",
doi = "10.1093/ietfec/e89-a.5.1362",
language = "English",
volume = "E89-A",
pages = "1362--1369",
journal = "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",
issn = "0916-8508",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "5",

}

TY - JOUR

T1 - Defeating simple power analysis on Koblitz curves

AU - Vuillaume, Camille

AU - Okeya, Katsuyuki

AU - Takagi, Tsuyoshi

PY - 2006/5

Y1 - 2006/5

N2 - Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.

AB - Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.

UR - http://www.scopus.com/inward/record.url?scp=33646805722&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33646805722&partnerID=8YFLogxK

U2 - 10.1093/ietfec/e89-a.5.1362

DO - 10.1093/ietfec/e89-a.5.1362

M3 - Article

AN - SCOPUS:33646805722

VL - E89-A

SP - 1362

EP - 1369

JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

SN - 0916-8508

IS - 5

ER -