Balanced point operations for side-channel protection of elliptic curve cryptography

@inproceedings{Batina2000BalancedPO,
  title={Balanced point operations for side-channel protection of elliptic curve cryptography},
  author={Lejla Batina and Nele Mentens and Bart Preneel and Ingrid Verbauwhede},
  year={2000}
}
The authors propose balanced algorithms for elliptic curve cryptography (ECC). The authors make the point addition and doubling balanced; that is, they are implemented as identical sequences of operations. As an example the authors implement an ECC point multiplication algorithm, using the approach of Montgomery, for which a single power trace does not expose the Hamming weight nor the bits of the secret key. Nevertheless, their fieldprogrammable gate array implementation is also compact and… CONTINUE READING
Highly Cited
This paper has 26 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 27 references

A hardware implementation of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field’

  • M. J. Potgieter
  • Final report of project EPR400. (Technical…
  • 2002

‘ An energy - efficient reconfigurable public - key cryptography processor

  • C. Paar, J. Goodman, A. P. Chandrakasan
  • IEEE J . Solid - St . Circ .
  • 2001

Similar Papers

Loading similar papers…