Open Access System for Information Sharing

Login Library

 

Article
Cited 7 time in webofscience Cited 8 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorPark, DJ-
dc.contributor.authorSim, SG-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-03-31T12:35:01Z-
dc.date.available2016-03-31T12:35:01Z-
dc.date.created2009-03-20-
dc.date.issued2003-01-
dc.identifier.issn0302-9743-
dc.identifier.other2004-OAK-0000004065-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/18062-
dc.description.abstractWe propose a fast scalar multiplication method using a change-of-basis matrix to prevent power analysis attacks on Koblitz curves. Our method assures the fastest execution time without offline computation compared with previous countermeasures against power analysis attacks. Using the change-of-basis matrix, the Frobenius endomorphism of Koblitz curves is executed in the normal basis representation, whereas point addition is executed in the polynomial basis. In addition, we restrict the range of the number of additions. Even though we do not conceal the number perfectly, the algorithm remains secure with a security parameter chosen carefully. These techniques enable our method to prevent SPA with little computational overhead. For DPA prevention, we introduce randomness with negligible overhead. Timings results show that the proposed method is as efficient as a sliding window method.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.subjectSPA-
dc.subjectDPA-
dc.subjectscalar multiplication-
dc.subjectsliding window methods-
dc.subjectbasis conversion-
dc.subjectKoblitz curve cryptosystems-
dc.subjectCRYPTOSYSTEMS-
dc.subjectSEARCH-
dc.titleFast scalar multiplication method using change-of-basis matrix to prevent power analysis attacks on Koblitz curves-
dc.typeArticle-
dc.contributor.college전자전기공학과-
dc.identifier.doi10.1007/978-3-540-24591-9_35-
dc.author.googlePark, DJ-
dc.author.googleSim, SG-
dc.author.googleLee, PJ-
dc.relation.volume2908-
dc.relation.startpage474-
dc.relation.lastpage488-
dc.contributor.id10051689-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.2908, pp.474 - 488-
dc.identifier.wosid000189200400035-
dc.date.tcdate2019-01-01-
dc.citation.endPage488-
dc.citation.startPage474-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume2908-
dc.contributor.affiliatedAuthorLee, PJ-
dc.identifier.scopusid2-s2.0-35048831899-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc7-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordAuthorSPA-
dc.subject.keywordAuthorDPA-
dc.subject.keywordAuthorscalar multiplication-
dc.subject.keywordAuthorsliding window methods-
dc.subject.keywordAuthorbasis conversion-
dc.subject.keywordAuthorKoblitz curve cryptosystems-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse