Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

被引:2
作者
Joye, Marc [1 ]
机构
[1] OneSpan, Brussels, Belgium
关键词
Elliptic curves; formal groups; degenerate curves; elliptic curve cryptosystems; fault attacks; countermeasures; INVALID-CURVE ATTACKS; ELLIPTIC CURVE; ADDITION LAWS; COMPLETE SYSTEMS; EDWARDS CURVES; RSA; FORM;
D O I
10.1515/jmc-2019-0030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks. Over the past few years, several techniques for secure implementations have been published. This paper revisits the ring extension method and its adaptation to the elliptic curve setting.
引用
收藏
页码:254 / 267
页数:14
相关论文
共 63 条
  • [21] Coron Jean-Sebastien, 2010, Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2010), P89, DOI 10.1109/FDTC.2010.9
  • [22] Improving the arithmetic of elliptic curves in the Jacobi model
    Duquesne, Sylvain
    [J]. INFORMATION PROCESSING LETTERS, 2007, 104 (03) : 101 - 105
  • [23] A normal form for elliptic curves
    Edwards, Harold M.
    [J]. BULLETIN OF THE AMERICAN MATHEMATICAL SOCIETY, 2007, 44 (03) : 393 - 422
  • [24] Farashahi RR, 2010, LECT NOTES COMPUT SC, V6056, P243
  • [25] Elliptic curve Paillier schemes
    Galbraith, SD
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 129 - 138
  • [26] Giraud C, 2004, INT FED INFO PROC, V153, P159
  • [27] Hesse Otto., 1844, J REINE ANGEW MATH, V28, P68, DOI DOI 10.1515/CRLL.1844.28.68
  • [28] Hisil H, 2007, LECT NOTES COMPUT SC, V4859, P138
  • [29] An exploration of affine group laws for elliptic curves
    Hisil, Huseyin
    Wong, Kenneth Koon-Ho
    Carter, Gary
    Dawson, Ed
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2011, 5 (01) : 1 - 50
  • [30] Hisil H, 2009, LECT NOTES COMPUT SC, V5594, P452, DOI 10.1007/978-3-642-02620-1_31