Securing Elliptic Curve Point Multiplication against Side-Channel Attacks

@inproceedings{Mller2001SecuringEC,
  title={Securing Elliptic Curve Point Multiplication against Side-Channel Attacks},
  author={Bodo M{\"o}ller},
  booktitle={ISC},
  year={2001}
}
For making elliptic curve point multiplication secure against side-channel attacks, various methods have been proposed using special point representations for specifically chosen elliptic curves. We show that the same goal can be achieved based on conventional elliptic curve arithmetic implementations. Our point multiplication method is much more general than the proposals requiring non-standard point representations; in particular, it can be used with the curves recommended by NIST and SECG… CONTINUE READING
Highly Influential
This paper has highly influenced 11 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 180 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 75 citations

180 Citations

01020'01'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 180 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Standards for efficient cryptography – SEC 1: Elliptic curve cryptography

  • Certicom Research
  • Version 1.0,
  • 2000
1 Excerpt

Standards for efficient cryptography – SEC 2: Recommended elliptic curve cryptography domain parameters

  • Certicom Research
  • Version 1.0,
  • 2000
2 Excerpts

Elliptic Curves in Cryptography, vol. 265 of London Mathematical Society Lecture Note Series

  • I. F. Blake, G. Seroussi, N. P. Smart
  • 1999
1 Excerpt