Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Weierstraß Elliptic Curves and Side-Channel Attacks
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
IEEE Transactions on Computers
ACM Transactions on Embedded Computing Systems (TECS)
Hi-index | 0.00 |
Side-channel security has aroused widespread attentions since the first publication of power analysis attack. Enormous research efforts were dedicated to new countermeasures against side-channel attacks. However, there have been very few reports about how to quantitatively verify the effectiveness. This paper presents statistical approaches of quantitative evaluation for Elliptic Curve Cryptosystems. The significance test over the difference of mean measures the distinguishability of the secret key in scalar multiplication. Experiment results demonstrate that the proposed evaluation approaches are accurate and feasible.