Keyword : side channel attack


Exact Power Analysis of Unified Code over Generalized Mersenne Prime Fields
Toshiyuki MASUE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/02/01
Vol. E96-A  No. 2 ; pp. 618-625
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
side channel attackgeneralized Mersenne primeunified codeelliptic curve cryptography
 Summary | Full Text:PDF(1.4MB)

On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
Toru AKISHITA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 140-146
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
elliptic curve cryptosystemsisomorphismisogenyside channel attackzero-value point attack
 Summary | Full Text:PDF(151KB)

Zero-Value Register Attack on Elliptic Curve Cryptosystem
Toru AKISHITA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 132-139
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
side channel attackdifferential power analysiselliptic curve cryptosystemaddition formulazero-value register
 Summary | Full Text:PDF(165.1KB)

On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks
Yasuyuki SAKAI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 154-160
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
side channel attackexponent recodingRSA cryptosystemselliptic curve cryptosystems
 Summary | Full Text:PDF(126.9KB)