Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

被引:2
作者
Joye, Marc [1 ]
机构
[1] OneSpan, Brussels, Belgium
关键词
Elliptic curves; formal groups; degenerate curves; elliptic curve cryptosystems; fault attacks; countermeasures; INVALID-CURVE ATTACKS; ELLIPTIC CURVE; ADDITION LAWS; COMPLETE SYSTEMS; EDWARDS CURVES; RSA; FORM;
D O I
10.1515/jmc-2019-0030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks. Over the past few years, several techniques for secure implementations have been published. This paper revisits the ring extension method and its adaptation to the elliptic curve setting.
引用
收藏
页码:254 / 267
页数:14
相关论文
共 63 条
  • [1] Antipa A, 2003, LECT NOTES COMPUT SC, V2567, P211
  • [2] Aumüller C, 2002, LECT NOTES COMPUT SC, V2523, P260
  • [3] Baek YJ, 2007, LECT NOTES COMPUT SC, V4464, P225
  • [4] The sorcerer's apprentice guide to fault attacks
    Bar-El, H
    Choukri, H
    Naccache, D
    Tunstall, M
    Whelan, C
    [J]. PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 370 - 382
  • [5] Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5023, P389
  • [6] Bernstein DJ, 2007, LECT NOTES COMPUT SC, V4833, P29
  • [7] Twisted Hessian Curves
    Bernstein, Daniel J.
    Chuengsatiansup, Chitchanok
    Kohel, David
    Lange, Tanja
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 269 - 294
  • [8] Biehl I, 2000, LECT NOTES COMPUT SC, V1880, P131
  • [9] Billet O, 2003, LECT NOTES COMPUT SC, V2643, P34
  • [10] Blake Ian, 1999, LONDON MATH SOC LECT, V265, DOI [10.1017/C609781107360211., DOI 10.1017/C609781107360211]