#### Filter Results:

- Full text PDF available (28)

#### Publication Year

2000

2011

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Benoît Chevallier-Mames, Mathieu Ciet, Marc Joye
- IACR Cryptology ePrint Archive
- 2003

This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to virtually any algorithm. In particular, we present several novel… (More)

- Mathieu Ciet, Marc Joye
- IACR Cryptology ePrint Archive
- 2003

Elliptic curve cryptosystems in the presence of faults were studied by Biehl, Meyer and Müller (2000). The first fault model they consider requires that the input point P in the computation of dP is chosen by the adversary. Their second and third fault models only require the knowledge of P. But these two latter models are less 'practical' in the sense that… (More)

- Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater
- EUROCRYPT
- 2003

In most algorithms involving elliptic curves, the most expensive part consists in computing multiples of points. This paper investigates how to extend the τ-adic expansion from Koblitz curves to a larger class of curves defined over a prime field having an efficiently-computable endomorphism φ in order to perform an efficient point multiplication with… (More)

- Eric Peeters, Michael Neve, Mathieu Ciet
- CHES
- 2004

Recently, Lenstra and Verheul proposed an efficient cryp-tosystem called XTR. This system represents elements of F * p 6 with order dividing p 2 − p + 1 by their trace over F p 2. Compared with the usual representation , this one achieves a ratio of three between security size and manipulated data. Consequently very promising performance compared with RSA… (More)

- Louis Goubin, Mitsuru Matsui, +65 authors Frederic Valette
- 2007

- Mathieu Ciet, Marc Joye, Kristin E. Lauter, Peter L. Montgomery
- IACR Cryptology ePrint Archive
- 2003

Recently, Eisenträger et al. proposed a very elegant method for speeding up scalar multiplication on elliptic curves. Their method relies on improved formulas for evaluating S = (2P + Q) from given points P and Q on an elliptic curve. Compared to the naive approach, the improved formulas save a field multiplication each time the operation is performed. This… (More)

- Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
- INDOCRYPT
- 2001

In 1999 Silverman [21] introduced a family of binary finite fields which are composite extensions of F 2 and on which arithmetic operations can be performed more quickly than on prime extensions of F2 of the same size. We present here a fast approach to elliptic curve cryptography using a distinguished subset of the set of Silverman fields F 2 N = F h n.… (More)

It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault inductions during RSA signature verification, we consider in this paper the signature counterpart. Our article introduces the first fault attack applied on RSA in standard mode. By… (More)

In this paper, we present a new parallel architecture to avoid side-channel analyses such as: timing attack, simple/differential power analysis, fault induction attack and simple/differential electromagnetic analysis. We use a Montgomery Multiplication based on Residue Number Systems. Thanks to RNS, we develop a design able to perform an RSA signature in… (More)

- Mathieu Ciet, Marc Joye
- ICICS
- 2003

Randomization techniques play an important role in the protection of cryptosystems against implementation attacks. This paper studies the case of elliptic curve cryptography and propose three novel randomization methods, for the elliptic curve point multiplication, which do not impact the overall performance. Our first method, dedicated to elliptic curves… (More)