Open Access System for Information Sharing

Login Library

 

Article
Cited 6 time in webofscience Cited 11 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorSim, SG-
dc.contributor.authorPark, DJ-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-04-01T02:19:57Z-
dc.date.available2016-04-01T02:19:57Z-
dc.date.created2009-03-20-
dc.date.issued2004-01-
dc.identifier.issn0302-9743-
dc.identifier.other2005-OAK-0000004665-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/24932-
dc.description.abstractSide channel attacks have been attracted by most implementers of cryptographic primitives. And Randomized Exponentiation Algorithm (REA) is believed to be a good countermeasure against them. This paper analyzes the security of the two well-known REAs, the Ha-Moon algorithm and the MIST algorithm. Finding the fact that the intermediate values are variable in two cases, this paper shows that Ha-Moon algorithm is not secure even when it deploys both randomized binary recording technique and branch removing technique for DPA and SPA, respectively. In addition, this paper analyzes the security of the MIST algorithm. Some adaptively chosen ciphertext attacker can lower the security deeply, which can be placed more below than Walter's analysis.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.subjectHa-Moon algorithm-
dc.subjectMIST algorithm-
dc.subjectrandomized exponentiation algorithm-
dc.subjectpower analysis-
dc.subjectADDITION-SUBTRACTION CHAINS-
dc.subjectSIDE CHANNEL ATTACK-
dc.subjectWINDOW METHOD-
dc.subjectCOUNTERMEASURES-
dc.subjectEXPONENTIATION-
dc.subjectCRYPTANALYSIS-
dc.titleNew power analysis on the Ha-Moon algorithm and the MIST algorithm-
dc.typeArticle-
dc.contributor.college전자전기공학과-
dc.identifier.doi10.1007/978-3-540-30191-2_23-
dc.author.googleSim, SG-
dc.author.googlePark, DJ-
dc.author.googleLee, PJ-
dc.relation.volume3269-
dc.relation.startpage291-
dc.relation.lastpage304-
dc.contributor.id10051689-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.3269, pp.291 - 304-
dc.identifier.wosid000224981700023-
dc.date.tcdate2019-02-01-
dc.citation.endPage304-
dc.citation.startPage291-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume3269-
dc.contributor.affiliatedAuthorLee, PJ-
dc.identifier.scopusid2-s2.0-33646761064-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc6-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordPlusSIDE CHANNEL ATTACK-
dc.subject.keywordPlusCOUNTERMEASURES-
dc.subject.keywordPlusEXPONENTIATION-
dc.subject.keywordPlusCRYPTANALYSIS-
dc.subject.keywordAuthorHa-Moon algorithm-
dc.subject.keywordAuthorMIST algorithm-
dc.subject.keywordAuthorrandomized exponentiation algorithm-
dc.subject.keywordAuthorpower analysis-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse