TU Darmstadt / ULB / TUbiblio

Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications

Stoettinger, Marc ; Madlener, Felix ; Huss, Sorin
Hrsg.: Platzner, Marco ; Teich, Jürgen ; Wehn, Norbert (2009)
Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications.
Buchkapitel, Bibliographie

Kurzbeschreibung (Abstract)

We introduce new concepts of countermeasure approaches against differential power analysis attacks to an essential operation of elliptic curve cryptography in GF(2^n). Similar to many other published countermeasures we are focusing on the architecture layer to secure the cryptographic operations. This type of countermeasures is geared to the well-known hiding methods in this research field, but we apply them on a different implementation layer. For securing the multiplication over GF(2^n), an essential operation in elliptic curve cryptography, we propose a countermeasure, which is highly scalable and thus allows to select arbitrary trade-offs between performance and side channel resistance.

Typ des Eintrags: Buchkapitel
Erschienen: 2009
Herausgeber: Platzner, Marco ; Teich, Jürgen ; Wehn, Norbert
Autor(en): Stoettinger, Marc ; Madlener, Felix ; Huss, Sorin
Art des Eintrags: Bibliographie
Titel: Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications
Sprache: Englisch
Publikationsjahr: Dezember 2009
Verlag: Springer
Kurzbeschreibung (Abstract):

We introduce new concepts of countermeasure approaches against differential power analysis attacks to an essential operation of elliptic curve cryptography in GF(2^n). Similar to many other published countermeasures we are focusing on the architecture layer to secure the cryptographic operations. This type of countermeasures is geared to the well-known hiding methods in this research field, but we apply them on a different implementation layer. For securing the multiplication over GF(2^n), an essential operation in elliptic curve cryptography, we propose a countermeasure, which is highly scalable and thus allows to select arbitrary trade-offs between performance and side channel resistance.

Freie Schlagworte: Secure Things;Elliptic Curve Cryptography, Side-Channel Attacks, Differential Power Attacks, Reconfiguration
Fachbereich(e)/-gebiet(e): LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
LOEWE > LOEWE-Zentren
LOEWE
Hinterlegungsdatum: 31 Dez 2016 00:15
Letzte Änderung: 17 Mai 2018 13:02
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen