中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 计算机科学国家重点实验室  > 会议论文
题名:
simple power analysis attacks using chosen message against ecc hardware implementations
作者: Li Huiyun ; Wu Keke ; Xu Guoqing ; Yuan Hai ; Luo Peng
会议文集: World Congress on Internet Security, WorldCIS-2011
会议名称: World Congress on Internet Security, WorldCIS-2011
会议日期: 2-Feb
出版日期: 2011
会议地点: London, United kingdom
关键词: Algorithms ; Hardware ; Internet ; Public key cryptography ; Telecommunication networks
出版地: United States
收录类别: EI
ISBN: 9780956426376
部门归属: (1) Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Chinese University of Hong Kong, Shenzhen 518055, China; (2) State Key Laboratory of Information Security, Institute of Software, Graduate University of Chinese Academy of Sciences, Beijing 100049, China
英文摘要: Chosen-message simple power analysis (SPA) attacks were powerful against public-key cryptosystem based on modular exponentiation, due to the special results of modular square and modular multiplication for input pair X and - X. However, the characteristics can not be applied to public-key cryptosystems based on scalar multiplications. This paper proposes novel chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications, where special input point P is chosen close to X-axis to generate noticeable variations for point doubling and point addition. The proposed attack can be applied to all standard implementations of the binary algorithms, both for left-to-right and right-to-left methods. This chosen-message method can also circumvent typical countermeasures such as the double-and-add-always algorithm. © 2011 WorldCIS.
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/14227
Appears in Collections:计算机科学国家重点实验室 _会议论文

Files in This Item:
File Name/ File Size Content Type Version Access License
simple power analysis attacks using chosen message against ecc hardware implementations.pdf(121KB)----限制开放-- 联系获取全文

Recommended Citation:
Li Huiyun,Wu Keke,Xu Guoqing,et al. simple power analysis attacks using chosen message against ecc hardware implementations[C]. 见:World Congress on Internet Security, WorldCIS-2011. London, United kingdom. 2-Feb.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Li Huiyun]'s Articles
[Wu Keke]'s Articles
[Xu Guoqing]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Li Huiyun]‘s Articles
[Wu Keke]‘s Articles
[Xu Guoqing]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace