On the exact flexibility of the flexible countermeasure against side channel attacks

2Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although elliptic curve cryptosystems are attractive candidates for implementing cryptography in memory constrained environments, in this context, one has to care about side channel attacks, which allow to reveal secret parameters by observing side channel information. Okeya and Takagi presented a fast countermeasure against side channel attacks on elliptic curves and qualified it as "flexible", since the user has full control on the ratio between memory consumption and efficiency. In this paper, we present two weaknesses in their scheme. We repair one of the weaknesses with a better implementation of their countermeasure, and recommend an additional countermeasure for repairing the second. Finally, we describe the situations where the repaired scheme is indeed flexible, that is, when it shows greater efficiency without compromising security. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Okeya, K., Takagi, T., & Vuillaume, C. (2004). On the exact flexibility of the flexible countermeasure against side channel attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3108, 466–477. https://doi.org/10.1007/978-3-540-27800-9_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free