Keyword : side channel attacks


Authenticated-Encrypted Analog-to-Digital Conversion Based on Non-Linearity and Redundancy Transformation
Vinod V. GADDE Makoto IKEDA 
Publication:   
Publication Date: 2019/12/01
Vol. E102-A  No. 12 ; pp. 1731-1740
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: 
Keyword: 
ADCside channel attacksinformation securityencryptionauthentication
 Summary | Full Text:PDF

Fault Analysis of the NTRUEncrypt Cryptosystem
Abdel Alim KAMAL Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/04/01
Vol. E94-A  No. 4 ; pp. 1156-1158
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
NTRUside channel attacksfault analysispublic key cryptography
 Summary | Full Text:PDF

Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
Yang LI Kazuo SAKIYAMA Shinichi KAWAMURA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 191-199
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
side channel attacksmaskingFourier transforms-boxprobability density function
 Summary | Full Text:PDF

BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis
Yuichi KOMANO Hideo SHIMIZU Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/09/01
Vol. E93-A  No. 9 ; pp. 1632-1638
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
side channel attackspower analysisCPAHamming weight and Hamming distance modelsDPA contest
 Summary | Full Text:PDF

Side Channel Attacks against Hash-Based MACs with PGV Compression Functions
Katsuyuki OKEYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 168-175
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Side Channel Attacks
Keyword: 
(keyed) hash functionHMACNMACPGV constructionside channel attacksdifferential power analysis (DPA)reverse DPA
 Summary | Full Text:PDF

Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure
Dong-Guk HAN Katsuyuki OKEYA Tae Hyun KIM Yoon Sung HWANG Beomin KIM Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5 ; pp. 1316-1327
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemside channel attacksSPADPABSD representationHa-Moon countermeasureEbeid-Hasan countermeasureAgagliate et al.'s countermeasure
 Summary | Full Text:PDF

Defeating Simple Power Analysis on Koblitz Curves
Camille VUILLAUME Katsuyuki OKEYA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5 ; pp. 1362-1369
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemsKoblitz curvessmartcardside channel attacksSPA countermeasure
 Summary | Full Text:PDF

Security Analysis of the SPA-Resistant Fractional Width Method
Katsuyuki OKEYA Tsuyoshi TAKAGI Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 161-168
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
elliptic curve cryptosystemssmartcardfractional windowside channel attacksflexibilitydiscrete logarithm problem
 Summary | Full Text:PDF

Side Channel Cryptanalysis on XTR Public Key Cryptosystem
Dong-Guk HAN Tetsuya IZU Jongin LIM Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5 ; pp. 1214-1223
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
XTR public key cryptosystemside channel attacksSPAdata-bit DPAaddress-bit DPAdoubling attackrefined power analysiszero-value attack
 Summary | Full Text:PDF

Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication
Katsuyuki OKEYA Dong-Guk HAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5 ; pp. 1140-1147
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemsside channel attacksSPADPAHa-Moon's countermeasurefinite Markov chain
 Summary | Full Text:PDF

On the Importance of Protecting Δ in SFLASH against Side Channel Attacks
Katsuyuki OKEYA Tsuyoshi TAKAGI Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 123-131
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
asymmetric signatureSFLASHside channel attacksSHA-1C*C*--hidden monomial problem
 Summary | Full Text:PDF

Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks
Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 161-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
elliptic curve cryptosystems (ECC)side channel attacksscalar multiplicationSIMD operation
 Summary | Full Text:PDF

Fast Elliptic Curve Multiplications with SIMD Operations
Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 85-93
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
Elliptic Curve Cryptosystems (ECC)scalar multiplicationwindow methodSIMD operationsside channel attacks
 Summary | Full Text:PDF

SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF
Katsuyuki OKEYA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 75-84
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
elliptic curve cryptosystemside channel attackswidth-w NAFsmart card
 Summary | Full Text:PDF

A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems
Katsuyuki OKEYA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1171-1180
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemsside channel attacksrandomized addition-subtraction chains countermeasureSPA attacktiming attack
 Summary | Full Text:PDF