DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sim, SG | - |
dc.contributor.author | Park, DJ | - |
dc.contributor.author | Lee, PJ | - |
dc.date.accessioned | 2016-04-01T02:19:57Z | - |
dc.date.available | 2016-04-01T02:19:57Z | - |
dc.date.created | 2009-03-20 | - |
dc.date.issued | 2004-01 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.other | 2005-OAK-0000004665 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/24932 | - |
dc.description.abstract | Side channel attacks have been attracted by most implementers of cryptographic primitives. And Randomized Exponentiation Algorithm (REA) is believed to be a good countermeasure against them. This paper analyzes the security of the two well-known REAs, the Ha-Moon algorithm and the MIST algorithm. Finding the fact that the intermediate values are variable in two cases, this paper shows that Ha-Moon algorithm is not secure even when it deploys both randomized binary recording technique and branch removing technique for DPA and SPA, respectively. In addition, this paper analyzes the security of the MIST algorithm. Some adaptively chosen ciphertext attacker can lower the security deeply, which can be placed more below than Walter's analysis. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.relation.isPartOf | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.subject | Ha-Moon algorithm | - |
dc.subject | MIST algorithm | - |
dc.subject | randomized exponentiation algorithm | - |
dc.subject | power analysis | - |
dc.subject | ADDITION-SUBTRACTION CHAINS | - |
dc.subject | SIDE CHANNEL ATTACK | - |
dc.subject | WINDOW METHOD | - |
dc.subject | COUNTERMEASURES | - |
dc.subject | EXPONENTIATION | - |
dc.subject | CRYPTANALYSIS | - |
dc.title | New power analysis on the Ha-Moon algorithm and the MIST algorithm | - |
dc.type | Article | - |
dc.contributor.college | 전자전기공학과 | - |
dc.identifier.doi | 10.1007/978-3-540-30191-2_23 | - |
dc.author.google | Sim, SG | - |
dc.author.google | Park, DJ | - |
dc.author.google | Lee, PJ | - |
dc.relation.volume | 3269 | - |
dc.relation.startpage | 291 | - |
dc.relation.lastpage | 304 | - |
dc.contributor.id | 10051689 | - |
dc.relation.journal | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Conference Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | LECTURE NOTES IN COMPUTER SCIENCE, v.3269, pp.291 - 304 | - |
dc.identifier.wosid | 000224981700023 | - |
dc.date.tcdate | 2019-02-01 | - |
dc.citation.endPage | 304 | - |
dc.citation.startPage | 291 | - |
dc.citation.title | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.citation.volume | 3269 | - |
dc.contributor.affiliatedAuthor | Lee, PJ | - |
dc.identifier.scopusid | 2-s2.0-33646761064 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 6 | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.subject.keywordPlus | SIDE CHANNEL ATTACK | - |
dc.subject.keywordPlus | COUNTERMEASURES | - |
dc.subject.keywordPlus | EXPONENTIATION | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordAuthor | Ha-Moon algorithm | - |
dc.subject.keywordAuthor | MIST algorithm | - |
dc.subject.keywordAuthor | randomized exponentiation algorithm | - |
dc.subject.keywordAuthor | power analysis | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.