期刊文献+

一种ECC加密芯片抗功耗攻击研究 被引量:10

Research of ECC Algorithm Resistant to Power Analysis Attacks
下载PDF
导出
摘要 设计了随机掩码在ECC加密算法中的应用方法,为了降低加密芯片的功耗和面积,提高运算性能,研究设计了关键步固定值掩码算法,实验证明提出的方法在资源增加非常有限的情况下可以有效抵抗一阶差分功耗攻击.同时,其他加密算法也可参考此关键步固定值掩码算法来高效设计抗功耗攻击加密芯片. First,power analysis attacks of elliptic curve cryptographic algorithms are introduced,the random mask in the application of ECC algorithm is proposed and designed,on this basis,a key step fixed-value masking method has proposed and designed in order to reduce the encryption chip's power consumption and area,to improve computing performance.It has been proved that the proposed algorithm can effectively resist the first-order differential power attacks.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第1期27-30,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60903203) 湖南省科技计划项目(09GK3023)
关键词 ECC 功耗攻击 随机掩码 关键步固定值掩码 防御 ECC power analysis attacks random masking key fixed masking resistant
  • 相关文献

参考文献7

二级参考文献19

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:15
  • 2Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis[J]. Lecture Notes in Computer Science, 1999(1666) : 388 - 397. 被引量:1
  • 3Eric Brier, Christophe Clavier, Francis Olivier, Correlation power analysis with a leakage model[C]//Cryptographic Hardware and Embedded Systems CHES 2004. Berlin: Springer, LNCS 2004(3156) : 16 - 29. 被引量:1
  • 4Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 11 - 19]. http://www. impan.gov.pl/BC/Program/conferences/07Crypt - abs/Aumonier% 20 - % 20SubmissionWorkshopSA.pdf. 被引量:1
  • 5Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks-revealing the secrets of smart cards[ M]. USA: Springer Science Business Media, 2007: 61 - 65. 被引量:1
  • 6Joan Daemen, Vincent Rijmen. The design of rijndael: AES - the advanced encryption standard [ M]. Berlin: Springer-Verlag, 2002. 被引量:1
  • 7Gebotys C, Ho S, Tiu A. EM analysis on rijindael and ECC on a PDA[C]//Proc. of CHES. UK, 2005. 被引量:1
  • 8K Itoh,T Izu,M Takenaka.Address-bit differential power analysis of cryptographic schemes OK-ECDH and OKECDSA.CHES'2002,LNCS 2523,2003:129~143 被引量:1
  • 9P Kocher,J Jaffe,B Jun.Differential power analysis.Advances in cryptology-CRYPTO'99,LNCS1666,1999:388~397 被引量:1
  • 10T S Messerges,E A Dabbish,R H Slosh.Power analysis attack of modular exponentiation in smartcards.CHES'99,LNCS1717,1999:144~157 被引量:1

共引文献7

同被引文献68

引证文献10

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部