An Improved Horizontal Correlation Analysis Using Collision Characteristics on Lookup Table Based Scalar Multiplication Algorithms
![]() |
Park, Dongjun
(Korea University)
Lee, Sangyub (Korea University) Cho, Sungmin (Crypt and Tech) Kim, HeeSeok (Korea University) Hong, Seokhie (Korea University) |
1 | National Institute of Standards and Technology, "Digital Signature Standard (DSS)," FIPS 186-4, July 2013. |
2 | D. Hankerson, A. Menezes and S. Vanstone, Guide to elliptic curve cryptography, Springer, New York, pp. 75-186, 2004. |
3 | OpenSSL, "openssl software library" https://www.openssl.org/ |
4 | GnuPG, "gnupg software library" https://gnupg.org/ |
5 | Bitcoin Core, "bitcoin core software library" https://bitcoin.org/ |
6 | E. Brier, C. Clavier, F. Olivier, "Correlation power analysis with a leakage model," Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, pp. 16-29, Aug. 2004. |
7 | K. Gandolfi, C. Mourtel, F. Olivier, "Electromagnetic analysis: concrete results," Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp. 251-261, May. 2001. |
8 | T. Kim, T. Kim, S. Hong, "Breaking Korea transit card with side-channel attack - Unauthorized recharging," Blackhat Asia, Mar. 2017 |
9 | K. Kim, T. Kim, T. Kim, S. Ryu, "AES wireless keyboard - template attack for Eavesdropping," Blackhat Asia, Mar. 2018. |
10 | P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," Advances in Cryptology - CRYPTO' 99, LNCS 1666, pp. 388-397, Aug. 1999. |
11 | C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, V. Verneuil, "Horizontal correlation analysis on exponentiation," Information and Communications Security, LNCS 6476, pp. 46-61, Dec. 2010. |
12 | N. Hanley, H. Kim, M. Tunstall, "Exploiting collisions in addition chain-based exponentiation algorithms using a single trace," Topics in Cryptology - CT-RSA 2015, LNCS 9048, pp. 431-448, Apr. 2015. |
13 | H.M. Edwards, "A normal form for elliptic curves," Bulletin of the American Mathematical Society, vol. 44, no. 3, pp. 393-422, Apr. 2007. DOI |
14 | A. Bauer, E. Jaulmes, E. Prouff, J.R. Reinhard, J. Wild, "Horizontal collision correlation attack on elliptic curves," Cryptography and Communications, vol. 7, no. 1, pp. 91-119, Mar. 2015. DOI |
15 | J.S. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," Cryptographic Hardware and Embedded Systems - CHES 1999, LNCS 1717, pp. 292-302, Aug. 1999. |
16 | M. Joye, S.M. Yen, "The Montgomery powering ladder," Cryptographic Hardware and Embedded Systems - CHES 2002, LNCS 2523, pp. 291-302, Aug. 2002. |
17 | B. Gierlichs, K. Lemker-Rust, C. Paar, "Templates vs. stochastic methods," Cryptographic Hardware and Embedded Systems - CHES 2006, LNCS 4249, pp. 15-29, Oct. 2006. |
![]() |