Presentation | 2006-03-17 Efficient DPA-and-SPA Secure Scalar Elliptic Curve Multiplication with Pre-computed Tables Takeshi KIYOMIYA, Atsuko MIYAJI, Kenji MIZOSOE, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Elliptic curve cryptosystem can implement short key length in comparison with RSA cryptosystem briefly in small memory. It is used by IC cards. In particular, on implementation with IC cards, side channel attack to become a menace. Therefore we must consider countermeasures. One method of Data-bit DPA (DDPA) countermeasures do randomisation of bit expression of a secret scalar. By existing countermeasures method, it use a random number for binary strings and make bit expression different expression in scalar multiplications. We proposed window methods which using a random number, and it is randomisation by bit expression of a secret scalar for DDPA countermeasures. In proposed schemes, by giving choice of conversion for Obit, it make more secure than existing countermeasures. In addition, Address-bit DPA measures make more secure of Randomized Data method and applied to window method. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Elliptic curve cryptosystem / Side-channel Attack / Address-bit DPA / Data-bit DPA / Window method |
Paper # | IT2005-116,ISEC2005-173,WBS2005-130 |
Date of Issue |
Conference Information | |
Committee | IT |
---|---|
Conference Date | 2006/3/10(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Theory (IT) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Efficient DPA-and-SPA Secure Scalar Elliptic Curve Multiplication with Pre-computed Tables |
Sub Title (in English) | |
Keyword(1) | Elliptic curve cryptosystem |
Keyword(2) | Side-channel Attack |
Keyword(3) | Address-bit DPA |
Keyword(4) | Data-bit DPA |
Keyword(5) | Window method |
1st Author's Name | Takeshi KIYOMIYA |
1st Author's Affiliation | School of Information Science, Japan Advanced Institute of Science and Technology (JAIST)() |
2nd Author's Name | Atsuko MIYAJI |
2nd Author's Affiliation | School of Information Science, Japan Advanced Institute of Science and Technology (JAIST) |
3rd Author's Name | Kenji MIZOSOE |
3rd Author's Affiliation | School of Information Science, Japan Advanced Institute of Science and Technology (JAIST) |
Date | 2006-03-17 |
Paper # | IT2005-116,ISEC2005-173,WBS2005-130 |
Volume (vol) | vol.105 |
Number (no) | 662 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |