We propose a new differential power analysis (DPA) countermeasure based on the “masking method” proposed by Messerges [11]. We also evaluate the security of our method by introducing a new idea of “probabilistic DPA.” Its processing speed is as fast as that of the straightforward implementation, and it requires little RAM so it is suitable for low-cost smartcards.
CITATION STYLE
Itoh, K., Takenaka, M., & Torii, N. (2002). DPA countermeasure based on the “masking method.” In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2288, pp. 440–456). Springer Verlag. https://doi.org/10.1007/3-540-45861-1_33
Mendeley helps you to discover research relevant for your work.