JP2002528771A5 - - Google Patents

Download PDF

Info

Publication number
JP2002528771A5
JP2002528771A5 JP2000578723A JP2000578723A JP2002528771A5 JP 2002528771 A5 JP2002528771 A5 JP 2002528771A5 JP 2000578723 A JP2000578723 A JP 2000578723A JP 2000578723 A JP2000578723 A JP 2000578723A JP 2002528771 A5 JP2002528771 A5 JP 2002528771A5
Authority
JP
Japan
Prior art keywords
point
points
power signature
doubling
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2000578723A
Other languages
English (en)
Japanese (ja)
Other versions
JP2002528771A (ja
JP4582912B2 (ja
Filing date
Publication date
Priority claimed from CA002252078A external-priority patent/CA2252078C/en
Application filed filed Critical
Publication of JP2002528771A publication Critical patent/JP2002528771A/ja
Publication of JP2002528771A5 publication Critical patent/JP2002528771A5/ja
Application granted granted Critical
Publication of JP4582912B2 publication Critical patent/JP4582912B2/ja
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

JP2000578723A 1998-10-28 1999-10-05 耐パワーシグニチャーアタック暗号法 Expired - Lifetime JP4582912B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CA2,252,078 1998-10-28
CA002252078A CA2252078C (en) 1998-10-28 1998-10-28 Power signature attack resistant cryptographic system
PCT/CA1999/000919 WO2000025204A1 (en) 1998-10-28 1999-10-05 Power signature attack resistant cryptography

Publications (3)

Publication Number Publication Date
JP2002528771A JP2002528771A (ja) 2002-09-03
JP2002528771A5 true JP2002528771A5 (https=) 2006-11-24
JP4582912B2 JP4582912B2 (ja) 2010-11-17

Family

ID=4162964

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2000578723A Expired - Lifetime JP4582912B2 (ja) 1998-10-28 1999-10-05 耐パワーシグニチャーアタック暗号法

Country Status (8)

Country Link
US (1) US6738478B1 (https=)
EP (1) EP1044405B1 (https=)
JP (1) JP4582912B2 (https=)
AT (1) ATE268022T1 (https=)
AU (1) AU5964299A (https=)
CA (1) CA2252078C (https=)
DE (1) DE69917592T2 (https=)
WO (1) WO2000025204A1 (https=)

Families Citing this family (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19963408A1 (de) * 1999-12-28 2001-08-30 Giesecke & Devrient Gmbh Tragbarer Datenträger mit Zugriffsschutz durch Schlüsselteilung
JP3821631B2 (ja) * 2000-05-30 2006-09-13 株式会社日立製作所 楕円曲線暗号におけるスカラー倍計算方法及び装置、並びに記憶媒体
FR2825863B1 (fr) * 2001-06-07 2003-09-19 Gemplus Card Int Procede de securisation d'un calcul d'exponentiation dans un dispositif electronique
DE10151129B4 (de) * 2001-10-17 2004-07-29 Infineon Technologies Ag Verfahren und Vorrichtung zum Berechnen eines Ergebnisses einer Exponentiation in einer Kryptographieschaltung
DE10156708B4 (de) * 2001-11-19 2005-09-29 Infineon Technologies Ag Verfahren und Vorrichtung zum Multiplizieren und Verfahren und Vorrichtung zum Addieren auf einer elliptischen Kurve
JP4067818B2 (ja) * 2001-12-10 2008-03-26 富士通株式会社 楕円曲線暗号装置、楕円曲線暗号プログラム及び楕円曲線暗号の演算方法
JP4034585B2 (ja) * 2002-01-28 2008-01-16 松下電器産業株式会社 楕円曲線演算装置及び楕円曲線演算方法
FR2838210B1 (fr) * 2002-04-03 2005-11-04 Gemplus Card Int Procede cryptographique protege contre les attaques de type a canal cache
US7555122B2 (en) 2002-12-04 2009-06-30 Wired Communications LLC Method for elliptic curve point multiplication
JP4789468B2 (ja) * 2002-12-18 2011-10-12 富士通株式会社 秘密鍵を用いた耐タンパ楕円曲線暗号処理
US7646872B2 (en) 2004-04-02 2010-01-12 Research In Motion Limited Systems and methods to securely generate shared keys
JP5147412B2 (ja) 2005-01-21 2013-02-20 サーティコム コーポレーション 楕円曲線乱数生成
EP1879164A1 (en) * 2005-04-27 2008-01-16 Matsushita Electric Industrial Co., Ltd. Information security device and elliptic curve operating device
CA2542556C (en) 2005-06-03 2014-09-16 Tata Consultancy Services Limited An authentication system executing an elliptic curve digital signature cryptographic process
DE102005042339B4 (de) * 2005-09-06 2007-08-16 Siemens Ag Verfahren zum sicheren Ver- oder Entschlüsseln einer Nachricht
EP1946205B1 (en) 2005-10-18 2010-04-14 Telecom Italia S.p.A. A method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems
DE602005020991D1 (de) * 2005-10-28 2010-06-10 Telecom Italia Spa Verfahren zur skalarmultiplikation in gruppen ellir nebenkanalattacken-beständige kryptosysteme
DE602006021601D1 (de) * 2005-11-03 2011-06-09 Certicom Corp Verfahren zur gleichzeitigen skalarmultiplikation
FR2893796B1 (fr) * 2005-11-21 2008-01-04 Atmel Corp Procede de protection par chiffrement
US9313027B2 (en) 2005-12-29 2016-04-12 Proton World International N.V. Protection of a calculation performed by an integrated circuit
DE102006002891B4 (de) 2006-01-20 2009-06-04 Siemens Ag Verfahren, Vorrichtung und System zum Verifizieren von auf einer elliptischen Kurve ermittelten Punkten
KR100850202B1 (ko) * 2006-03-04 2008-08-04 삼성전자주식회사 Ecc 패스트 몽고매리 전력 래더 알고리즘을 이용하여dfa 에 대응하는 암호화 방법
US8065735B2 (en) 2006-03-16 2011-11-22 Gemalto Sa Method of securing a calculation of an exponentiation or a multiplication by a scalar in an electronic device
DE102006013515A1 (de) * 2006-03-23 2007-10-04 Siemens Ag Kryptographisches Verfahren mit elliptischen Kurven
EP1840732A1 (en) * 2006-03-31 2007-10-03 Axalto SA Protection against side channel attacks
WO2007113697A2 (en) * 2006-04-06 2007-10-11 Nxp B.V. Secure decryption method
US20070288761A1 (en) * 2006-06-09 2007-12-13 Dale Jason N System and method for booting a multiprocessor device based on selection of encryption keys to be provided to processors
US20070288739A1 (en) * 2006-06-09 2007-12-13 Dale Jason N System and method for masking a boot sequence by running different code on each processor
US20070288740A1 (en) * 2006-06-09 2007-12-13 Dale Jason N System and method for secure boot across a plurality of processors
US7774616B2 (en) * 2006-06-09 2010-08-10 International Business Machines Corporation Masking a boot sequence by providing a dummy processor
US20070288738A1 (en) * 2006-06-09 2007-12-13 Dale Jason N System and method for selecting a random processor to boot on a multiprocessor system
US7594104B2 (en) * 2006-06-09 2009-09-22 International Business Machines Corporation System and method for masking a hardware boot sequence
US7856101B2 (en) * 2007-02-07 2010-12-21 King Fahd University Of Petroleum And Minerals Method for elliptic curve scalar multiplication
US8243919B2 (en) * 2007-03-07 2012-08-14 Research In Motion Limited Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
WO2009004505A1 (en) * 2007-07-05 2009-01-08 Nxp B.V. Microprocessor in a security-sensitive system
US7991162B2 (en) * 2007-09-14 2011-08-02 University Of Ottawa Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields
WO2009055904A1 (en) * 2007-10-30 2009-05-07 Certicom Corp. Fault detection in exponentiation and point multiplication operations using a montgomery ladder
CA2752750A1 (en) * 2009-02-27 2010-09-02 Certicom Corp. System and method for performing exponentiation in a cryptographic system
JP5449576B2 (ja) 2010-12-27 2014-03-19 三菱電機株式会社 演算装置、演算装置の楕円スカラー倍算方法、楕円スカラー倍算プログラム、演算装置の剰余演算方法および剰余演算プログラム
US8334705B1 (en) 2011-10-27 2012-12-18 Certicom Corp. Analog circuitry to conceal activity of logic circuitry
US8635467B2 (en) 2011-10-27 2014-01-21 Certicom Corp. Integrated circuit with logic circuitry and multiple concealing circuits
US9900154B2 (en) * 2013-12-23 2018-02-20 Nxp B.V. Optimized hardward architecture and method for ECC point addition using mixed affine-jacobian coordinates over short weierstrass curves
US9979543B2 (en) 2013-12-23 2018-05-22 Nxp B.V. Optimized hardware architecture and method for ECC point doubling using jacobian coordinates over short weierstrass curves
US9929862B2 (en) 2013-12-23 2018-03-27 Nxp B.V. Optimized hardware architecture and method for ECC point doubling using Jacobian coordinates over short Weierstrass curves
US9391773B2 (en) 2014-04-04 2016-07-12 Qualcomm Incorporated Elliptic curve point multiplication procedure resistant to side-channel information leakage
US9645794B2 (en) * 2014-09-23 2017-05-09 Texas Instruments Incorporated Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography
US9590805B1 (en) * 2014-12-23 2017-03-07 EMC IP Holding Company LLC Ladder-based cryptographic techniques using pre-computed points
US9735953B2 (en) * 2015-03-06 2017-08-15 Qualcomm Incorporated Side channel analysis resistant architecture
US10491401B2 (en) * 2017-02-21 2019-11-26 Google Llc Verification of code signature with flexible constraints
CN108875416B (zh) * 2018-06-22 2020-05-19 北京智芯微电子科技有限公司 椭圆曲线多倍点运算方法和装置

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10222065A (ja) * 1997-02-03 1998-08-21 Nippon Telegr & Teleph Corp <Ntt> 冪乗剰余演算方法及び装置
US6252959B1 (en) * 1997-05-21 2001-06-26 Worcester Polytechnic Institute Method and system for point multiplication in elliptic curve cryptosystem
EP1710951A3 (en) * 1997-07-17 2006-10-25 Matsushita Electric Industrial Co., Ltd. Elliptic curve calculation apparatus capable of calculating multiples at high speed
CA2243761C (en) * 1998-07-21 2009-10-06 Certicom Corp. Timing attack resistant cryptographic system
US20020057796A1 (en) * 1998-12-24 2002-05-16 Lambert Robert J. Method for accelerating cryptographic operations on elliptic curves
EP1323027A1 (en) * 2000-08-29 2003-07-02 NTRU Cryptosystems, Inc. Speed enhanced cryptographic method and apparatus
CA2369545C (en) * 2001-12-31 2013-01-08 Blackberry Limited Method and apparatus for elliptic curve scalar multiplication

Similar Documents

Publication Publication Date Title
JP2002528771A5 (https=)
CA2252078A1 (en) Power signature attack resistant cryptographic system
Frank-Kamenetskii et al. Torsional and bending rigidity of the double helix from data on small DNA rings
CA2444405A1 (en) Methods and apparatus for efficient computation of one-way chains in cryptographic applications
WO2001016881A3 (en) Method for improving neural network architectures using evolutionary algorithms
JP2004537062A5 (https=)
JP2004506350A5 (https=)
EP2306670A8 (en) Hybrid digital signature scheme
EP1648111A4 (en) INFALSIFIABLE ENCRYPTION USING AN INDIVIDUAL KEY
NO20015377L (no) Fremgangsmåte og anordning for öking av hjertefunksjonen
CA2403023A1 (en) Source waveforms for electroseismic exploration
WO2006045114A3 (en) Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
ATE429955T1 (de) Impulserzeugersystem
EP1469397A3 (en) Modeling directed scale-free object relationships
CN101366232A (zh) 同步标量乘法算法
AU2001278767A1 (en) Musical sound generator, portable terminal, musical sound generating method, andstorage medium
DE60320016D1 (de) Verfahren zur ganzzahldivision gegen angriffe an versteckten kanälen
WO2007145707A3 (en) Use of non-hydroxide bases with heat for relaxing or straightening hair
WO2023201359A3 (en) Method and system for detecting expiration of a unique cryptographic identifier on a distributed transfer network
CA2273632A1 (fr) Procede de signature numerique
EP1343072A3 (en) Method of generating an efficient sequence of multi-level random numbers used for an information recording medium
AU2003292338A1 (en) Molecular identification of bacteria of genus less thanigreater thanstreptococcusless than/igreater than and related genuses
EP1469372A3 (en) User authentication using rhythmic passwords
EP1202488A3 (en) Encryption sub-key generation circuit
WO2005096135A8 (fr) Procede et dispositif pour accomplir une operation cryptographique