TU Darmstadt / ULB / TUbiblio

Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications

Stoettinger, Marc and Madlener, Felix and Huss, Sorin Platzner, Marco and Teich, Jürgen and Wehn, Norbert (eds.) (2009):
Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications.
Springer, pp. 305-321, [Book Section]

Abstract

We introduce new concepts of countermeasure approaches against differential power analysis attacks to an essential operation of elliptic curve cryptography in GF(2^n). Similar to many other published countermeasures we are focusing on the architecture layer to secure the cryptographic operations. This type of countermeasures is geared to the well-known hiding methods in this research field, but we apply them on a different implementation layer. For securing the multiplication over GF(2^n), an essential operation in elliptic curve cryptography, we propose a countermeasure, which is highly scalable and thus allows to select arbitrary trade-offs between performance and side channel resistance.

Item Type: Book Section
Erschienen: 2009
Editors: Platzner, Marco and Teich, Jürgen and Wehn, Norbert
Creators: Stoettinger, Marc and Madlener, Felix and Huss, Sorin
Title: Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications
Language: ["languages_typename_1" not defined]
Abstract:

We introduce new concepts of countermeasure approaches against differential power analysis attacks to an essential operation of elliptic curve cryptography in GF(2^n). Similar to many other published countermeasures we are focusing on the architecture layer to secure the cryptographic operations. This type of countermeasures is geared to the well-known hiding methods in this research field, but we apply them on a different implementation layer. For securing the multiplication over GF(2^n), an essential operation in elliptic curve cryptography, we propose a countermeasure, which is highly scalable and thus allows to select arbitrary trade-offs between performance and side channel resistance.

Publisher: Springer
ISBN: 978-9-04-813484-7
Uncontrolled Keywords: Secure Things;Elliptic Curve Cryptography, Side-Channel Attacks, Differential Power Attacks, Reconfiguration
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
LOEWE > LOEWE-Zentren
LOEWE
Date Deposited: 31 Dec 2016 00:15
Identification Number: ISS:Stoettinger:2009:DynamicallyR:160
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)

View Item View Item