Open Access System for Information Sharing

Login Library

 

Article
Cited 1 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorShin, JH-
dc.contributor.authorPark, DJ-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-04-01T01:57:10Z-
dc.date.available2016-04-01T01:57:10Z-
dc.date.created2009-03-20-
dc.date.issued2006-01-
dc.identifier.issn0302-9743-
dc.identifier.other2006-OAK-0000005864-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/24077-
dc.description.abstractThe Ha-Moon algorithm [4] is a countermeasure against power analysis using a randomized addition chain. It has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen et al. improved the algorithm by removing these drawbacks [11], Their new algorithm is inversion-free, has 6, left-to-right approach, and employs a window method. They insisted that their algorithm leads to a more secure countermeasure in computing modular exponentiation against side-channel attacks. This algorithm, however, still has a similar weakness observed in [2, 10]. This paper shows that the improved HaMoon algorithm is vulnerable to differential power analysis even if we employ their method in selecting si.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.subjectHa-Moon algorithm-
dc.subjectrandomized exponentiation algorithm-
dc.subjectside-channel attack-
dc.subjectSIGNED-SCALAR MULTIPLICATION-
dc.subjectPOWER ANALYSIS-
dc.subjectCOUNTERMEASURE-
dc.titleDPA attack on the improved Ha-Moon algorithm-
dc.typeArticle-
dc.contributor.college전자전기공학과-
dc.author.googleShin, JH-
dc.author.googlePark, DJ-
dc.author.googleLee, PJ-
dc.relation.volume3786-
dc.relation.startpage283-
dc.relation.lastpage291-
dc.contributor.id10051689-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.3786, pp.283 - 291-
dc.identifier.wosid000236882500022-
dc.date.tcdate2019-01-01-
dc.citation.endPage291-
dc.citation.startPage283-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume3786-
dc.contributor.affiliatedAuthorLee, PJ-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc1-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordAuthorHa-Moon algorithm-
dc.subject.keywordAuthorrandomized exponentiation algorithm-
dc.subject.keywordAuthorside-channel attack-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse