Abstract
We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both USA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small. In comparison with fc-ary method, computation time of our countermeasure is only 105% in 1024-bit RSA and 119% in 160-bit ECC. © Springer-Verlag 2003.
Cite
CITATION STYLE
Itoh, K., Yajima, J., Takenaka, M., & Torii, N. (2003). DPA Countermeasures by Improving the Window Method. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2523, 303–317. https://doi.org/10.1007/3-540-36400-5_23
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.