- Full text PDF available (3)
—The paper presents arithmetic level protections for ECC processor against some side channel attacks. The proposed protection is based on random recodings of the secret key in the double base number system (DBNS). DBNS is a highly redundant and sparse number system. Here, the high redundancy level of DBNS is used to randomly modify on-the-fly the ki digits… (More)
The paper presents details on fast and secure GF(2^m) multipliers dedicated to elliptic curve cryptography applications. Presented design approach aims at high efficiency and security against side channel attacks of a hardware multiplier. The security concern in the design process of a GF(2^m) multiplier is quite a novel concept. Basing on the results… (More)
Electrical activity variations in a circuit are one of the information leakage used in side channel attacks. In this work, we present GF(2 m) multipliers with reduced activity variations for asymmetric cryptography. Useful activity of typical multiplication algorithms is evaluated. The results show strong shapes, which can be used as a small source of… (More)
Intitulé de la thèse : Opérateurs arithmétiques sur GF(2 m): étude de compromis performances-consommation-sécurité.