A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Key Bit-Dependent Side-Channel Attacks on Protected Binary Scalar Multiplication †
2018
Applied Sciences
Binary scalar multiplication, which is the main operation of elliptic curve cryptography, is vulnerable to side-channel analysis. It is especially vulnerable to side-channel analysis using power consumption and electromagnetic emission patterns. Thus, various countermeasures have been reported. However, they focused on eliminating patterns of conditional branches, statistical characteristics according to intermediate values, or data inter-relationships. Even though secret scalar bits are
doi:10.3390/app8112168
fatcat:y4nsmmzkmrhmdp2nhrw6qsbmdy