Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A survey of fast exponentiation methods
Journal of Algorithms
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Hi-index | 0.00 |
Although the possibility of attacking elliptic curve cryptosystems (ECC) by power analysis repeatedly appears in research papers, there were few electromagnetic analysis papers and conclusive experiments where actual elliptic curve cryptosystems were successfully attacked and prevented. In this paper we describe electromagnetic (EM) analysis experiments conducted on 3 implementations of elliptic curve cryptosystems. They are respectively binary, double-and-add-always and Montgomery methods of point multiplication. The experimental results indicate that using simple electromagnetic analysis (SEMA), the complete key material could be successfully retrieved from binary method, but not from doubleand-add-always and Montgomery method.