IEEE Transactions on Computers
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
ISC '01 Proceedings of the 4th International Conference on Information Security
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
ISC '02 Proceedings of the 5th International Conference on Information Security
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
Countermeasures for preventing comb method against SCA attacks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Hi-index | 0.00 |
At ISC 2001 a method for securing elliptic curve point multiplication against side-channel attacks has been proposed by Möller [Lecture Notes in Comput. Sci., vol. 2200, Springer-Verlag, Berlin, 2001, pp. 324-334]. We show that this method does not offer acceptable security. Namely, differential and simple power analysis techniques may reveal the complete secret key.