期刊文献+

抗侧信道攻击的椭圆曲线点乘算法设计 被引量:1

Point Multiplication Algorithm Design for Preventing Side-Channel Attack in Elliptic Curve Cryptosystems
下载PDF
导出
摘要 简要地介绍了有关椭圆曲线(Ellipticcurve)的数学知识,提出了一种基于投影坐标的ECC快速点乘算法。从实现的角度,对在椭圆曲线密码体制中的运算(点乘)进行了侧信道攻击分析,并对该算法进行了安全性改进。 In this article,the mathematics knowledge about elliptic curve is introduced briefly.We put forward a fast algorithm for point multiplication by use of projective coordinates,and analyze the possible side channel attack during the process of point multiplication.Furthermore,we modify the algorithm for stronger security.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第8期148-151,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划资助项目(编号:2001AA141010)
关键词 椭圆曲线 侧信道攻击 点乘 实现安全性 elliptic curve,side channel attack,point multiplication ,security in implementation.
  • 相关文献

参考文献10

  • 1N Koblitz.Elliptic curve cryptosystems[J].Mathematics of Computation,1987;48:203~209
  • 2V miller.Uses of elliptic curves in cryptography.Advances in Cryptology Crypto 85,LNCS218,1986:417~426
  • 3M Brown,D Hankerson,J Lo'pez et al.Software implementation of the NIST elliptic cures over prime fields
  • 4Marc Joye.Elliptic curves and side-channel attacks.http:/www.gemplus.com/smart/
  • 5Paul Kocher,Joshua Jaffe,Benjamin Jun.Differential power analysis[C].In:M Wiener ed.Advance in Cryptology-CRYPTO' 99,Lecture Notes in Computer Science,1999:388~397
  • 6Kariene Gandolfi,Christophe Mourtel,Francis Oliivier.Electromagnetic analysis:Concrete results[C].In:S K koc,D Naccache,C Paar eds.Cryptographic Hardware and Embedded System CHES 2001,Lecture Notes in Computer Science,Springer Verlag,2001:251~261
  • 7Cetin Kaya Koc.High-Speed RSA Implementation.RSA Laboratories.RSA Data Security,Inc
  • 8Marc Joye,Christophe Tymen.Protection Against Differential analysis for Elliptic Curve Cryptography:an Algebraic Approach[C].In:Cryptographic Hardware and Embedded Systems CHES 2001,Lecture Notes in Computer Science,Springer Verlag Press,2001
  • 9Pierre Yvan Liardet,Nigel P Smart.Preventing SPA/DPA in ECC Systems Using the Jacobi Form[C].In:CHES 2001,Lecture Notes in Computer Science,Springer-Verlag Press,2001
  • 10OKEYA K,SAKURAI K.Power analysis breaks elliptic curve crytosystems even secure against the timing attack[C].In:Cryptology-INDOCRYPT 2000,B K Roy,E Okamoto eds.Lecture Notes in Computer Science,2000:178~ 190

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部