4,834 Hits in 5.7 sec

Power Analysis to ECC Using Differential Power Between Multiplication and Squaring [chapter]

Toru Akishita, Tsuyoshi Takagi
2006 Lecture Notes in Computer Science  
In this paper, we propose a novel power analysis attack using differential power between modular multiplication and modular squaring.  ...  Power analysis is a serious attack to implementation of elliptic curve cryptosystems (ECC) on smart cards. For ECC, many power analysis attacks and countermeasures have been proposed.  ...  Conclusion We presented detailed descriptions of the biased power consumption between Montgomery modular multiplication and Montgomery modular squaring.  ... 
doi:10.1007/11733447_11 fatcat:3mpu5s4yovfdpmbjth4opeer6e

Area Efficient Implementation of Elliptic Curve Point Multiplication Algorithm

Sunil Devidas, Dr.Vijay R.
2015 International Journal of Advanced Computer Science and Applications  
Graph plot between‗d' andPower (W)' Fig.17 . VI.  ...  Such an algorithm would deteriorate due to power analysis attacks when doubling and addition operations are distinct [2] .  ... 
doi:10.14569/ijacsa.2015.060404 fatcat:iy4bznqdvfguvascz5ctqhdbqq

Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security [chapter]

Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede
2009 Lecture Notes in Computer Science  
However, selecting and integrating a set of countermeasures targeting multiple attacks into an ECC design is far from trivial. Security, performance and cost need to be considered together.  ...  The programmable design of the coprocessor enables tradeoffs between area, speed, and security.  ...  Examples of passive attacks include Simple Power Analysis (SPA), Differential Power Analysis (DPA), Simple Electromagnetic Analysis (SEMA) and Differential Electromagnetic Analysis (DEMA).  ... 
doi:10.1007/978-3-642-04138-9_21 fatcat:crj6f5vw55hwrhy6yqu3nznz7u

On Security of XTR Public Key Cryptosystems Against Side Channel Attacks [chapter]

Dong-Guk Han, Jongin Lim, Kouichi Sakurai
2004 Lecture Notes in Computer Science  
In [LV00a,SL01], authors remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as timing attacks and Differential Power Analysis  ...  It is regarded that XTR is suitable for a variety of environments, including low-end smart cards, and XTR is the excellent alternative to either RSA or ECC.  ...  Especially, we consider following four SCA : simple power analysis (SPA), data-bit differential power analysis (DDPA) proposed by Coron [Cor99] , addressbit differential power analysis (ADPA) proposed  ... 
doi:10.1007/978-3-540-27800-9_39 fatcat:rlo3tn56drdvraz7hejgw57q7a

Power Analysis Attacks on ECC: A Major Security Threat

Hilal Houssain, Mohamad Badra, Turki F.
2012 International Journal of Advanced Computer Science and Applications  
However, like any other cryptographic primitive, ECC implementations are vulnerable to Power Analysis Attacks (PAAs) that may reveal the secret keys by exploiting leaked power consumption from running  ...  Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security.  ...  ACKNOWLEDGMENT The authors would like to acknowledge the support of Umm Al-Qura University, Makkah, Saudi Arabia and the support of LIMOS, CNRS, University Blaise Pascal, Clermont-Ferrand II, France.  ... 
doi:10.14569/ijacsa.2012.030615 fatcat:hppzbbla2jdajindgcktv4lf5q

A Study on the SCA Trends for Application to IoT Devices

Bo-Yeon Sim, Dong-Guk Han
2020 Journal of Internet Services and Information Security  
This is a very powerful attack using only a single-trace and can be applied not only to public-key cryptography but also to post-quantum cryptography, which is actively being studied to counter the quantum  ...  Over the past 20 years, side-channel analysis (SCA) on IC Chip has mainly taken place.  ...  Acknowledgments This work was supported as part of Military Crypto Research Center (UD170109ED) funded by Defense Acquisition Program Administration (DAPA) and Agency for Defense Development (ADD).  ... 
doi:10.22667/jisis.2020.02.29.002 dblp:journals/jisis/SimH20 fatcat:4sjvs66efzfctfw3v5emu7yezi

Distinguishing Multiplications from Squaring Operations [chapter]

Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P. Marnane
2009 Lecture Notes in Computer Science  
In this paper we present a new approach to attacking a modular exponentiation and scalar multiplication based by distinguishing multiplications from squaring operations using the instantaneous power consumption  ...  We extrapolate our observations and assess the consequences for elliptic curve cryptosystems when unified formulae for point addition are used.  ...  The work described in this paper has been supported in part by the European Commission IST Programme under Contract IST-2002-507932 ECRYPT and EPSRC grant EP/F039638/1 "Investigation of Power Analysis  ... 
doi:10.1007/978-3-642-04159-4_22 fatcat:nyqnk4mo45c25b7m7rapyussk4

Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor

Nele Mentens, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede, Bart Preneel
2006 2006 International Conference on Field Programmable Logic and Applications  
It supports Elliptic Curve Cryptography (ECC) as well as the older RSA standard. When choosing adequate key lengths, RSA and ECC are assumed to be secure from an algorithmic point of view.  ...  We overcome these drawbacks by fitting the public key architecture and algorithms into a coprocessor that optimally exploites the dedicated features on a Spartan XC3S4000.  ...  To prevent Differential Power Analysis (DPA) attacks [5, 12] , which use many power consumption traces together with some statistical analysis, the exponent is "blinded".  ... 
doi:10.1109/fpl.2006.311205 dblp:conf/fpl/MentensSBVP06 fatcat:fhw4szm75ranpit2mebsiawmmu

Evaluation of Angiogenesis and Pathological Classification of Extrahepatic Cholangiocarcinoma by Dynamic MR Imaging for E-Healthcare

Jinyun Tan, Xijun Sun, Shaoyu Wang, Baoqin Ma, Zhaohui Chen, Yaowei Shi, Li Zhang, Mohd Asif Shah, Malik Alazzam
2021 Journal of Healthcare Engineering  
At present, the technology cannot be used alone, which is just an assisted method during the conventional MRI examination. 50 ECC patients, admitted to Indira Gandhi Medical College and Hospital between  ...  There were 15 cases with highly differentiated carcinoma, 23 cases with moderately differentiated carcinoma, and 12 cases with lowly differentiated carcinoma.  ...  with ECC pathological classification, as well as with VEGF expression, was analyzed by the Spearman test. e Pearson test was for the correlation analysis between ECC and MVD.  ... 
doi:10.1155/2021/8666498 pmid:34671450 pmcid:PMC8523230 fatcat:tpncfdjj3jbyjmerglzk344u6a

DPA Countermeasures by Improving the Window Method [chapter]

Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii
2003 Lecture Notes in Computer Science  
We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems.  ...  All countermeasures are based on the window method, and can be used in both RSA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small.  ...  Figure 5 shows the example of the differential power trace, and table 1 shows the expected and measured AR for 4 spikes appeared in the differential power trace.  ... 
doi:10.1007/3-540-36400-5_23 fatcat:kudtstejtncbtaad2bpqphgbze

Horizontal Attacks Against ECC: From Simulations to ASIC [chapter]

Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer
2020 Lecture Notes in Computer Science  
We run horizontal differential side-channel attacks against simulated power traces for the same kP design synthesized using two different compile options after synthesis and after layout.  ...  We found that the compile_ultra option reduces the success rate significantly from 5 key candidates with a correctness of between 75 and 90 per cent down to 3 key candidates with a maximum success rate  ...  and differential power analysis (DPA).  ... 
doi:10.1007/978-3-030-42051-2_5 fatcat:4pbeqquoazcqjkxrwgkqddujf4

Improving the Randomized Initial Point Countermeasure Against DPA [chapter]

Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
2006 Lecture Notes in Computer Science  
Not only standard DPA but also recently proposed refined power analysis (RPA) and zero value analysis (ZVA) should be considered.  ...  Itoh, Izu and Takenaka proposed a secure and efficient countermeasure (the randomized initial point countermeasure, RIP) in order to resist these attacks.  ...  Acknowledgements The authors would like to thank Naoya Torii and anonymous reviewers for their helpful comments.  ... 
doi:10.1007/11767480_32 fatcat:d4cbqrglwvdbljak2cevi7qbd4

MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks [chapter]

Zhe Liu, Erich Wenger, Johann Großschädl
2014 Lecture Notes in Computer Science  
We also describe our efforts to harden MoTE-ECC against side-channel attacks (e.g. simple power analysis) and introduce a highly regular implementation of the comb method.  ...  To demonstrate the performance of MoTE-ECC, we take (ephemeral) ECDH key exchange between two nodes as example, which requires each node to execute two scalar multiplications.  ...  We thank the anonymous reviewers of CHES 2013 and ACNS 2014 for their valuable comments and suggestions.  ... 
doi:10.1007/978-3-319-07536-5_22 fatcat:iqnj7vinfndjnortprszzpjv6u

Efficient Countermeasures Against Power Analysis for Elliptic Curve Cryptosystems [chapter]

Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
2004 IFIP International Federation for Information Processing  
The power analysis on smart cards is a real threat for cryptographic applications.  ...  by Goubin and the Zero-value Point Analysis (ZPA) by Akishita-Takagi.  ...  Acknowledgments The authors would like to thank Toru Akishita, JJean-Bernard Fischer and Naoya Torii for their valuable and helpful comments on the preliminary version of this paper.  ... 
doi:10.1007/1-4020-8147-2_7 fatcat:qulzg45d65bv5fjegnw4zmndwa

Page 19 of None Vol. 61, Issue 4 [page]

2007 None  
Statistical Analysis A two-way (trial-by-time) repeated-measures ANOVA was em- ployed to test significant differences between (heavy CON, heavy ECC, and light CON) and within (rest, baseline, exercise)  ...  Relationships between variables were established using a multiple regression procedure in which the subjects were treated as a categorical variable and entered as a predictor parameter, providing a correlation  ... 
« Previous Showing results 1 — 15 out of 4,834 results