Power analysis attacks on elliptic curve based systems work by analysing the point multiplication algorithm. Recently Goubin observed that if an attacker can choose the point P to enter into the point multiplication algorithm then none of the standard three randomizations can fully defend against a DPA attack. In this paper we examine Goubin's attack in more detail and completely discount its effectiveness when the attacker chooses a point of finite order, for the remaining cases we propose a defence based on using isogenies of small degree. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Smart, N. P. (2003). An analysis of Goubin’s refined power analysis attack. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2779, 281–290. https://doi.org/10.1007/978-3-540-45238-6_23
Mendeley helps you to discover research relevant for your work.