simple power analysis attacks using chosen message against ecc hardware implementations
文献类型:会议论文
作者 | Li Huiyun ; Wu Keke ; Xu Guoqing ; Yuan Hai ; Luo Peng |
出版日期 | 2011 |
会议名称 | World Congress on Internet Security, WorldCIS-2011 |
会议日期 | 2-Feb |
会议地点 | London, United kingdom |
关键词 | Algorithms Hardware Internet Public key cryptography Telecommunication networks |
页码 | 68-72 |
英文摘要 | Chosen-message simple power analysis (SPA) attacks were powerful against public-key cryptosystem based on modular exponentiation, due to the special results of modular square and modular multiplication for input pair X and - X. However, the characteristics can not be applied to public-key cryptosystems based on scalar multiplications. This paper proposes novel chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications, where special input point P is chosen close to X-axis to generate noticeable variations for point doubling and point addition. The proposed attack can be applied to all standard implementations of the binary algorithms, both for left-to-right and right-to-left methods. This chosen-message method can also circumvent typical countermeasures such as the double-and-add-always algorithm. © 2011 WorldCIS. |
收录类别 | EI |
会议录 | World Congress on Internet Security, WorldCIS-2011
![]() |
会议录出版地 | United States |
ISBN号 | 9780956426376 |
源URL | [http://124.16.136.157/handle/311060/14227] ![]() |
专题 | 软件研究所_计算机科学国家重点实验室 _会议论文 |
推荐引用方式 GB/T 7714 | Li Huiyun,Wu Keke,Xu Guoqing,et al. simple power analysis attacks using chosen message against ecc hardware implementations[C]. 见:World Congress on Internet Security, WorldCIS-2011. London, United kingdom. 2-Feb. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。