Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks | |
Keke Wu; Huiyun Li; Fengqi Yu | |
刊名 | Journal of Computers |
2010 | |
卷号 | 5期号:12页码:1878-1884 |
英文摘要 | At the elliptic curve cryptosystems (ECC) implementation stage, a major concern is securing scalar multiplications against so-called side-channel attacks (SCA). Existing solutions reach the goal by inserting dummy operations (typically increase 33% computational costs) based on commonly-used binary method, which largely increases the computational costs and prohibits the deployment of ECC in computation resource-restricted devices. In this paper, we for the first time propose a secure scalar multiplication method that does not penalise the computational cost compared to binary method. We partition the bit string of the scalar in half and extracting the common substring from the two parts based on bit-wise logical operations, so as to save the number of point additions required for the computation of the common substring. Computational results demonstrate the proposed method remains approximately the same computational cost as binary method. The side-channel experiments prove that the proposed method is secure against SSCA. Also, we use the randomization technique to secure our method against differential SCA (DSCA |
收录类别 | EI |
原文出处 | http://www.ojs.academypublisher.com/index.php/jcp/article/viewArticle/051218781884 |
语种 | 英语 |
内容类型 | 期刊论文 |
源URL | [http://ir.siat.ac.cn:8080/handle/172644/2706] |
专题 | 深圳先进技术研究院_集成所 |
作者单位 | Journal of Computers |
推荐引用方式 GB/T 7714 | Keke Wu,Huiyun Li,Fengqi Yu. Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks[J]. Journal of Computers,2010,5(12):1878-1884. |
APA | Keke Wu,Huiyun Li,&Fengqi Yu.(2010).Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks.Journal of Computers,5(12),1878-1884. |
MLA | Keke Wu,et al."Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks".Journal of Computers 5.12(2010):1878-1884. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论