This paper analyzes the resistance of smart-card implementations of elliptic curve cryptography against side-channel attacks, and more specifically against attacks using differential power analysis (DPA) and variants thereof. The use of random curve isomorphisms is a promising way (in terms of efficiency) for thwarting DPA-type for elliptic curve cryptosystems but its implementation needs care. Various generalized DPA-type attacks are presented against improper implementations. Namely, a second-order DPA-type attack is mounted against an additive variant of randomized curve isomorphisms and a "refined" DPA-type attack against a more general variant. Of independent interest, this paper also provides an exact analysis of second-order DPA-type attacks. © 2004 Springer Science + Business Media, Inc.
CITATION STYLE
Joye, M. (2004). Smart-card implementation of elliptic curve cryptography and DPA-type attacks. In IFIP Advances in Information and Communication Technology (Vol. 153, pp. 115–125). Springer New York LLC. https://doi.org/10.1007/1-4020-8147-2_8
Mendeley helps you to discover research relevant for your work.