A novel elliptic curve scalar multiplication algorithm against power analysis (Q474700): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q1707365
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Yu Jie Zhou / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2013/862508 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2089473596 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3718617 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of tripartite and multi-party authenticated key agreement protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulatability and security of certificateless threshold signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249254 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4826108 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043945 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797784 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4448412 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information and Communications Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient elliptic curve scalar multiplication algorithms resistant to power analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797814 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Elliptic Curve Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950061 / rank
 
Normal rank

Latest revision as of 07:56, 9 July 2024

scientific article
Language Label Description Also known as
English
A novel elliptic curve scalar multiplication algorithm against power analysis
scientific article

    Statements

    A novel elliptic curve scalar multiplication algorithm against power analysis (English)
    0 references
    0 references
    0 references
    0 references
    24 November 2014
    0 references
    Summary: Nowadays, power analysis attacks are becoming more and more sophisticated. Through power analysis attacks, an attacker can obtain sensitive data stored in smart cards or other embedded devices more efficiently than with any other kind of physical attacks. Among power analysis, simple power analysis (SPA) is probably the most effective against elliptic curve cryptosystem, because an attacker can easily distinguish between point addition and point doubling in a single execution of scalar multiplication. To make elliptic curve scalar multiplication secure against SPA attacks, many methods have been proposed using special point representations. In this paper, a simple but efficient SPA-resistant multiscalar multiplication is proposed. The method is to convert the scalar into a nonadjacent form (NAF) representation at first and then constitute it in a new signed digit representation. This new representation is undertaken at a small precomputation cost, as each representation needs just one doubling and 1/2 additions for each bit. In addition, when combined with randomization techniques, the proposed method can also guard against differential power analysis (DPA) attack.
    0 references

    Identifiers