Power analysis attacks against NTRU and their countermeasures |
Song, Jeong-Eun
(School of Computer and Information Engineering, Inha University)
Han, Dong-Guk (Department of Mathematics, Kookmin University) Lee, Mun-Kyu (School of Computer and Information Engineering, Inha University) Choi, Doo-Ho (Electronics and Telecommunications Research Institute) |
1 | J. Hoffstein and J.H. Silverman, "Optimizations for NTRU," Proceedings of Public Key Cryptography and Computational Number Theory, pp. 1-12, Sep 2000 |
2 | G. Gaubatz, J.P. Kaps, and B. Sunar, "Public key cryptography in sensor networks-Revisited," ESAS 2004, LNCS3313, pp. 2-18, 2004 |
3 | P.C. Kocher. "Timing Attacks on Implementations of Diffie-Hellman.RSA. DSS. and Other Systems." Advances in Cryptology, CRYPTO '96. LNCS1109, pp. 10S-113. 1996 |
4 | http://www.ntru.com/cryptolab/faqs.htm |
5 | T.S. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software," CHES 2000, LNCS 1965, pp. 238-251, 2000 |
6 | E. Brier. C. Clavier. and F. Olivier. "Correlation Power Analysis with a Leakage Model," CHES 2004, LNCS 3156,pp. 16-29, 2004 |
7 | E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers,"CT-RSA 2006, LNCS 3860, pp. 192-207, 2006 |
8 | W. Whyte et aI., "Draft Standard for Public-Key Cryptographic Techniques Based on Hard Problems over Lattices," Oct. 2006 |
9 | D.V. Bailey, D. Coffin, A. Elbirt, J.H. Silverman, and A.D. Woodbury,"NTRU in constrained devices," CHES 2001. LNCS 2162, pp. 262-272, 2001 |
10 | J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Algorithmic Number Theory(ANTSlll), LNCS 1423, pp. 267-288,1998 |
11 | A. Atici, L. Batina, B. Gierlichs, and 1. Verbauwhede, "Power analysis on NTRU implementations for RFIDs: First results," In Workshop on RFID Security 2008, pp. 128-139, July 2008 |
12 | P. Kocher, J. Jaffe. and B. Jun. "Differential power analysis." Advances in Cryptology, CRYPTO '99. LNCS 1666. pp. 388-397, 1999 |