期刊文献+

抵抗SPA和DPA的椭圆曲线上点的标量乘法 被引量:2

Scalar Multiplication on ECC Resistant Against SPA and DPA
下载PDF
导出
摘要 标量乘法是椭圆曲线密码体制中的一种基本算法.针对二进制方法和抵抗SPA的二进制方法无法抵抗倍点攻击和差分攻击的缺点,提出了两种改进方法.方法一给出了区分奇数和偶数的标量乘法,计算标量乘法时完全对奇数进行操作,从而能够抵抗倍点攻击.方法二采用同时随机化标量和随机化基点的方法,从而达到更好的随机性.这两种方法计算量不大且简单易行. Two commonly used methods of scalar multiplication,binary methods and SPA-resistant binary methods were analyzed. To against doubling attack and DPA attack,the methods were improved. First,even numbers were turned to odd numbers by add 1 ,then ‘0' will not be handled,so doubling attack can be resisted. Second,the effect of random scalar and random point is proved. The quantity of computations is not large and it's easy to be realized.
出处 《天津科技大学学报》 CAS 2009年第2期67-69,共3页 Journal of Tianjin University of Science & Technology
基金 天津科技大学科研基金资助项目(20060227)
关键词 椭圆曲线 标量乘法 简单能量分析 差分能量分析 elliptic curve scalar multiplication SPA DPA
  • 相关文献

参考文献4

  • 1Joye Marc.Elliptic curves and side-channel analysis[].ST Journal of System Research.2003
  • 2Izu Tetsuya,M?ller Bodo,Takagi Tsuyoshi.Improved elliptic curve multiplication methods resistant against side channel attacks[].Progress in Cryptology.2002
  • 3Coron J S.Resistance against differential power analysis for ellip-tic curve cryptosystems[].CHES’LNCS.1999
  • 4Fouque P.A,Valette F.The doubling attack-why upwards is better than downwards[].th workshop on Cryptographic Hardware and Embedded Systems-CHES’.2003

同被引文献13

  • 1朱冰,陈运,吴震,陈俊,刘鹤.一种抗简单功耗分析攻击的椭圆曲线标量乘快速实现算法[J].成都信息工程学院学报,2011,26(1):5-10. 被引量:2
  • 2TETSUYA I, BODO M, TSUYOSH T. Improved elliptic curve multiplication methods resistant against side channel attacks[A]. Progress in Cryptology, LNCS 2551[C]. Springer-Verlag, 2002. 295-3 l 3.
  • 3MILLER V S. Use of elliptic curves in cryptography[A]. Proceedings of Crypto 85 LNCS 218[C]. Springer, 1986. 417-426.
  • 4KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Com- putation, 1987,(48):203- 209.
  • 5ACICMEZ O, SEIFERT J P, KOC C K. Predicting secret keys via branch prediction[A]. Topics in Cryptology-CT-RSA 2007, Leture Notes in Computer Science[C]. 2006.225-242.
  • 6ACIICMEZ O, KOC C K, SEIFERT J P. On the Power of Simple Branch Prediction Analysis[R]. Cryptology ePrint Archive, 2006. 312-320.
  • 7KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Lecture Notes in Computer Science; Proceedings of the 19th Annual Interna- tional Cryptology. Conference on Advances in Cryptology[C]. 1999. 388- 397.
  • 8KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Advances in Cryptology- CRYPTO'96, of Lecture Notes in Computer Science[C]. 1996. 104-113.
  • 9陈运,吴震,陈俊,万武南,吕永其.防范边信道攻击的等功耗编码实现算法[J].电子科技大学学报,2008,37(2):168-171. 被引量:14
  • 10杜之波,陈运,吴震,陈俊,周俐莎.防范边信道攻击的逆伪操作实现算法[J].计算机工程,2010,36(3):131-133. 被引量:9

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部