Power analysis to ECC using differential power between multiplication and squaring

10Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Power analysis is a serious attack to implementation of elliptic curve cryptosysterns (ECC) on smart cards. For ECC, many power analysis attacks and countermeasures have been proposed. In this paper, we propose a novel power analysis attack using differential power between modular multiplication and modular squaring. We show how this difference occurs in CMOS circuits by counting the expectation of signal transition frequency, and present a simulation result on our ECC co-processor. The proposed attack is applicable to two efficient power analysis countermeasures based on unified addition formulae and elliptic curves with Montgomery form. © IFIP International Federation for Information Processing 2006.

Cite

CITATION STYLE

APA

Akishita, T., & Takagi, T. (2006). Power analysis to ECC using differential power between multiplication and squaring. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3928 LNCS, pp. 151–164). https://doi.org/10.1007/11733447_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free