
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir, "Comparative Power Analysis of Modular Exponentiation Algorithms," IEEE Transactions on Computers, vol. 59, no. 6, pp. 795807, June, 2010.  
BibTex  x  
@article{ 10.1109/TC.2009.176, author = {Naofumi Homma and Atsushi Miyamoto and Takafumi Aoki and Akashi Satoh and Adi Shamir}, title = {Comparative Power Analysis of Modular Exponentiation Algorithms}, journal ={IEEE Transactions on Computers}, volume = {59}, number = {6}, issn = {00189340}, year = {2010}, pages = {795807}, doi = {http://doi.ieeecomputersociety.org/10.1109/TC.2009.176}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  Comparative Power Analysis of Modular Exponentiation Algorithms IS  6 SN  00189340 SP795 EP807 EPD  795807 A1  Naofumi Homma, A1  Atsushi Miyamoto, A1  Takafumi Aoki, A1  Akashi Satoh, A1  Adi Shamir, PY  2010 KW  Sidechannel attacks KW  poweranalysis attacks KW  RSA KW  modular exponentiation KW  waveform matching. VL  59 JA  IEEE Transactions on Computers ER   
[1] P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. CRYPTO '99, pp. 388397, Aug. 1999.
[2] P. Kocher, "Timing Attacks on Implementations of DiffieHellman, RSA, DSS, and Other Systems," Proc. CRYPTO '96, pp. 104113, Aug. 1996.
[3] T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '99), pp. 144157, Aug. 1999.
[4] W. Schindler, "A Timing Attack against RSA with the Chinese Remainder Theorem," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00), pp. 109124, Aug. 2000.
[5] C.D. Walter and S. Thompson, "Distinguishing Exponent Digits by Observing Modular Subtractions," Proc. Cryptographer's Track at the RSA Conf. Topics in Cryptology (CTRSA '01), pp. 192207, Apr. 2001.
[6] R. Novak, "SPABased Adaptive ChosenCiphertext Attack on RSA Implementation," Proc. Int'l Workshop Practice and Theory in Public Key Cryptography (PKC '02), pp. 252262, Feb. 2002.
[7] J.A. Menezes, C.P. Oorschot, and A.S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997.
[8] B.D. Boer, K. Lemke, and G. Wicke, "A DPA Attack against the Modular Reduction within a CRT Implementation of RSA," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '02), pp. 228243, Aug. 2002.
[9] A.P. Fouque and F. Valette, "The Doubling Attack—Why Upwards is Better Than Downwards," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '03), pp. 269280, Sept. 2003.
[10] S.M. Yen, W.C. Lien, S.J. Moon, and J.C. Ha, "Power Analysis by Exploiting Chosen Message and Internal Collisions—Vulnerability of Checking Mechanism for RSADecryption," Proc. Mycrypt '05, pp. 183195, Sept. 2005.
[11] P.L. Montgomery, "Modular Multiplication without Trial Division," Math. Computation, vol. 44, no. 170, pp. 519521, 1985.
[12] K. Schramm, T. Wollinger, and C. Paar, "A New Class of Collision Attacks and its Application to DES," Proc. Int'l Workshop Fast Software Encryption (FSE '03), pp. 206222, Feb. 2003.
[13] K. Schramm, G. Leander, P. Felke, and C. Paar, "A CollisionAttack on AES Combining Side Channel and DifferentialAttack," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), pp. 163175, Aug. 2004.
[14] A. Bogdanov, "Improved Side Channel Collision Attacks on AES," Proc. Int'l Workshop Selected Areas in Cryptography (SAC '07), pp. 8495, Aug. 2007.
[15] N. Homma, A. Miyamoto, T. Aoki, A. Satoh, and A. Shamir, "CollisionBased Power Analysis of Modular Exponentiation Using ChosenMessage Pairs," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '08), pp. 1529, Aug. 2008.
[16] C.K. Koc, "HighSpeed RSA Implementation," Technical Report TR201, RSA Laboratories, Nov. 1994.
[17] J.S. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '99), pp. 192302, Aug. 1999.
[18] M. Joye and S.M. Yen, "The Montgomery Powering Ladder," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '02), pp. 291302, Aug. 2002.
[19] M. Joye, "Highly Regular RighttoLeft Algorithms for Scalar Multiplication," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07), pp. 135147, Sept. 2007.
[20] S.M. Yen and M. Joye, "Checking Before Output may Not Be Enough against FaultBased Cryptanalysis," IEEE Trans. Computers, vol. 49, no. 9, pp. 967970, Sept. 2000.
[21] C.D. Walter, "Sliding Windows Succumbs to Big Mac Attack," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '01), pp. 286299, May 2001.
[22] N. Homma, S. Nagashima, Y. Imai, T. Aoki, and A. Satoh, "HighResolution Side Channel Attack Using PhaseBased Waveform Matching," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06), pp. 187200, May 2006.
[23] Q. Chen, M. Defrise, and F. Deconinck, "Symmetric PhaseOnly Matched Filtering of FourierMellin Transforms for Image Registration and Recognition," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 16, no. 12, pp. 11561168, Dec. 1994.
[24] K. Takita, T. Aoki, Y. Sasaki, T. Higuchi, and K. Kobayashi, "HighAccuracy Subpixel Image Registration Based on PhaseOnly Correlation," IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences, vol. E86A, no. 8, pp. 19251934, Aug. 2003.
[25] Side Channel Attack Standard Evaluation Board, http://www. rcis.aist.go.jp/specialSASEBO /, 2009.
[26] C.D. Walter, "MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis," Proc. Cryptographer's Track at the RSA Conf. Topics in Cryptology (CTRSA '02), pp. 5366, Apr. 2002.
[27] K. Itoh, J. Yajima, and M. Takenaka, "DPA Countermeasures by Improving the Window Method," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '02), pp. 303317, Aug. 2002.