DPA Countermeasures by Improving the Window Method

36Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both USA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small. In comparison with fc-ary method, computation time of our countermeasure is only 105% in 1024-bit RSA and 119% in 160-bit ECC. © Springer-Verlag 2003.

Cite

CITATION STYLE

APA

Itoh, K., Yajima, J., Takenaka, M., & Torii, N. (2003). DPA Countermeasures by Improving the Window Method. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2523, 303–317. https://doi.org/10.1007/3-540-36400-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free