A Random M-ary Method-Based Countermeasure against Power Analysis Attacks on ECC
![]() |
안만기
(국방품질관리소)
하재철 (나사렛대학교 정보과학부) 이훈재 (동서대학교 인터넷공학부) 문상재 (경북대학교 전자전기컴퓨터학부) |
1 |
Securing elliptic curve point multiplication against side-channel attacks
/
|
2 |
DPA countemeasure by improving the window method
/
|
3 |
Elliptic curve cryptosystems
/
DOI ScienceOn |
4 |
Elliptic Curves in Cryptography
/
|
5 |
Preventing SPA/DPA in ECC systems using the a Jacobi Form
/
|
6 |
A method for obtaining digital signatures and public-key cryptosystems
/
DOI ScienceOn |
7 |
Differential Fault Analysis of Secret Key Cryptosystems
/
|
8 |
Power Analysis Attacks on Moular Exponentiation in Smart cards
/
|
9 |
More flexible exponentiation with precomputation
/
|
10 |
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other System
/
|
11 |
/
|
12 |
A new elliptic curve scalar multiplication algorithm to resistant simple power analysis
/
|
13 |
Randomized signed-scalar multip- lication of ECC to resist power attacks
/
|
14 |
A second-order DPA attack breaks a window-method based countemeasure against side channel attacks
/
|
15 |
Differential Power Analysis
/
|
16 |
Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems
/
|
17 |
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
/
|
![]() |