Power analysis is a serious attack to implementation of elliptic curve cryptosysterns (ECC) on smart cards. For ECC, many power analysis attacks and countermeasures have been proposed. In this paper, we propose a novel power analysis attack using differential power between modular multiplication and modular squaring. We show how this difference occurs in CMOS circuits by counting the expectation of signal transition frequency, and present a simulation result on our ECC co-processor. The proposed attack is applicable to two efficient power analysis countermeasures based on unified addition formulae and elliptic curves with Montgomery form. © IFIP International Federation for Information Processing 2006.
CITATION STYLE
Akishita, T., & Takagi, T. (2006). Power analysis to ECC using differential power between multiplication and squaring. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3928 LNCS, pp. 151–164). https://doi.org/10.1007/11733447_11
Mendeley helps you to discover research relevant for your work.