Smart-card implementation of elliptic curve cryptography and DPA-type attacks

8Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper analyzes the resistance of smart-card implementations of elliptic curve cryptography against side-channel attacks, and more specifically against attacks using differential power analysis (DPA) and variants thereof. The use of random curve isomorphisms is a promising way (in terms of efficiency) for thwarting DPA-type for elliptic curve cryptosystems but its implementation needs care. Various generalized DPA-type attacks are presented against improper implementations. Namely, a second-order DPA-type attack is mounted against an additive variant of randomized curve isomorphisms and a "refined" DPA-type attack against a more general variant. Of independent interest, this paper also provides an exact analysis of second-order DPA-type attacks. © 2004 Springer Science + Business Media, Inc.

Cite

CITATION STYLE

APA

Joye, M. (2004). Smart-card implementation of elliptic curve cryptography and DPA-type attacks. In IFIP Advances in Information and Communication Technology (Vol. 153, pp. 115–125). Springer New York LLC. https://doi.org/10.1007/1-4020-8147-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free