Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Camille VUILLAUME, Katsuyuki OKEYA, Tsuyoshi TAKAGI, "Defeating Simple Power Analysis on Koblitz Curves" in IEICE TRANSACTIONS on Fundamentals,
vol. E89-A, no. 5, pp. 1362-1369, May 2006, doi: 10.1093/ietfec/e89-a.5.1362.
Abstract: Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e89-a.5.1362/_p
Copy
@ARTICLE{e89-a_5_1362,
author={Camille VUILLAUME, Katsuyuki OKEYA, Tsuyoshi TAKAGI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Defeating Simple Power Analysis on Koblitz Curves},
year={2006},
volume={E89-A},
number={5},
pages={1362-1369},
abstract={Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.},
keywords={},
doi={10.1093/ietfec/e89-a.5.1362},
ISSN={1745-1337},
month={May},}
Copy
TY - JOUR
TI - Defeating Simple Power Analysis on Koblitz Curves
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1362
EP - 1369
AU - Camille VUILLAUME
AU - Katsuyuki OKEYA
AU - Tsuyoshi TAKAGI
PY - 2006
DO - 10.1093/ietfec/e89-a.5.1362
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E89-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2006
AB - Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed from left to right, and can be easily stored or even randomly generated.
ER -