Abstract | ||
---|---|---|
Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose two countermeasures against side channel attacks on Koblitz curves. Both of them utilize a fixed-pattern recoding to defeat simple power analysis. Our first technique extends a known countermeasure to the special case of Koblitz curves. In our second technique, the scalar is recoded from left to right, and can be easily stored or even randomly generated. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11506157_19 | ACISP |
Keywords | Field | DocType |
special class,simple power analysis,side channel attack,special case,known countermeasure,binary curve,scalar multiplication,suitable candidate,koblitz curve,low-end processor,efficient representation,smartcard,side channel attacks | Power analysis,Scalar multiplication,Computer security,Computer science,Scalar (physics),Cryptanalysis,Arithmetic,Theoretical computer science,Electronic countermeasure,Side channel attack,Binary number,Special case | Conference |
Volume | ISSN | ISBN |
3574 | 0302-9743 | 3-540-26547-3 |
Citations | PageRank | References |
8 | 0.58 | 14 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Katsuyuki Okeya | 1 | 447 | 38.47 |
Tsuyoshi Takagi | 2 | 1086 | 110.32 |
Camille Vuillaume | 3 | 90 | 10.61 |