MX2012005408A - Metodo exponencial modular y dispositivo resistente contra ataques de canales laterales. - Google Patents
Metodo exponencial modular y dispositivo resistente contra ataques de canales laterales.Info
- Publication number
- MX2012005408A MX2012005408A MX2012005408A MX2012005408A MX2012005408A MX 2012005408 A MX2012005408 A MX 2012005408A MX 2012005408 A MX2012005408 A MX 2012005408A MX 2012005408 A MX2012005408 A MX 2012005408A MX 2012005408 A MX2012005408 A MX 2012005408A
- Authority
- MX
- Mexico
- Prior art keywords
- module
- modular
- mod
- values
- result
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/722—Modular multiplication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7261—Uniform execution, e.g. avoiding jumps, or using formulae with the same power profile
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computational Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- General Engineering & Computer Science (AREA)
- Complex Calculations (AREA)
- Storage Device Security (AREA)
- Error Detection And Correction (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP11305568 | 2011-05-11 | ||
| EP11176404A EP2523096A1 (en) | 2011-05-11 | 2011-08-03 | Modular exponentiation and device resistant against side-channel attacks |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MX2012005408A true MX2012005408A (es) | 2012-11-21 |
Family
ID=44546155
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2012005408A MX2012005408A (es) | 2011-05-11 | 2012-05-09 | Metodo exponencial modular y dispositivo resistente contra ataques de canales laterales. |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US8984040B2 (enExample) |
| EP (2) | EP2523096A1 (enExample) |
| JP (1) | JP5977996B2 (enExample) |
| CN (1) | CN102779022B (enExample) |
| BR (1) | BR102012010971A2 (enExample) |
| CA (1) | CA2775325A1 (enExample) |
| MX (1) | MX2012005408A (enExample) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9645794B2 (en) * | 2014-09-23 | 2017-05-09 | Texas Instruments Incorporated | Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography |
| CN104811297B (zh) * | 2015-04-23 | 2018-06-12 | 成都信息工程学院 | 针对RSA之M-ary实现模乘余数输入侧信道攻击 |
| CN106571916B (zh) * | 2015-10-12 | 2020-06-30 | 瑞昱半导体股份有限公司 | 解密装置、方法及电路 |
| CN109791517B (zh) | 2016-12-21 | 2023-09-08 | 密码研究公司 | 保护并行乘法运算免受外部监测攻击 |
| EP3447509B1 (en) * | 2017-08-21 | 2021-05-26 | Eshard | Method of testing the resistance of a circuit to a side channel analysis |
| US11895230B2 (en) * | 2019-01-24 | 2024-02-06 | Nec Corporation | Information processing apparatus, secure computation method, and program |
| CN112260818B (zh) * | 2020-10-19 | 2022-09-20 | 中国人民解放军战略支援部队信息工程大学 | 侧信道曲线的增强方法、侧信道攻击方法及装置 |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2228493C (en) * | 1997-02-03 | 2005-05-03 | Nippon Telegraph And Telephone Corporation | Scheme for carrying out modular calculations based on redundant binary calculation |
| WO2007104706A1 (fr) * | 2006-03-16 | 2007-09-20 | Gemplus | Procede de securisation d'un calcul d'une exponentiation ou d'une multiplication par un scalaire dans un dispositif electronique |
| EP1840732A1 (en) * | 2006-03-31 | 2007-10-03 | Axalto SA | Protection against side channel attacks |
| FR2949925A1 (fr) * | 2009-09-09 | 2011-03-11 | Proton World Int Nv | Protection d'une generation de nombres premiers contre des attaques par canaux caches |
-
2011
- 2011-08-03 EP EP11176404A patent/EP2523096A1/en not_active Withdrawn
-
2012
- 2012-04-24 CA CA2775325A patent/CA2775325A1/en not_active Abandoned
- 2012-05-04 EP EP12166750.5A patent/EP2523097B1/en not_active Not-in-force
- 2012-05-09 MX MX2012005408A patent/MX2012005408A/es active IP Right Grant
- 2012-05-09 BR BRBR102012010971-9A patent/BR102012010971A2/pt not_active IP Right Cessation
- 2012-05-09 JP JP2012107478A patent/JP5977996B2/ja not_active Expired - Fee Related
- 2012-05-11 CN CN201210145594.6A patent/CN102779022B/zh not_active Expired - Fee Related
- 2012-05-11 US US13/469,139 patent/US8984040B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| EP2523097B1 (en) | 2016-01-20 |
| JP5977996B2 (ja) | 2016-08-24 |
| US20120290634A1 (en) | 2012-11-15 |
| EP2523097A1 (en) | 2012-11-14 |
| EP2523096A1 (en) | 2012-11-14 |
| CN102779022A (zh) | 2012-11-14 |
| BR102012010971A2 (pt) | 2013-11-12 |
| CN102779022B (zh) | 2017-03-01 |
| JP2012239171A (ja) | 2012-12-06 |
| US8984040B2 (en) | 2015-03-17 |
| HK1176423A1 (en) | 2013-07-26 |
| CA2775325A1 (en) | 2012-11-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107040362B (zh) | 模乘设备和方法 | |
| Yen et al. | Power analysis by exploiting chosen message and internal collisions–vulnerability of checking mechanism for RSA-decryption | |
| Yen et al. | Relative doubling attack against montgomery ladder | |
| MX2012005408A (es) | Metodo exponencial modular y dispositivo resistente contra ataques de canales laterales. | |
| US20090214025A1 (en) | Method for Scalar Multiplication in Elliptic Curve Groups Over Prime Fields for Side-Channel Attack Resistant Cryptosystems | |
| Oswald | Enhancing simple power-analysis attacks on elliptic curve cryptosystems | |
| US8243920B2 (en) | Method for scalar multiplication in elliptic curve groups over binary polynomial fields for side-channel attack-resistant cryptosystems | |
| US20110013770A1 (en) | Encrypting method having countermeasure function against power analyzing attacks | |
| KR20140046568A (ko) | 단순 전력 파형 분석 및 오류 주입 분석을 방지하는 타원곡선 암호화 방법 및 그 시스템 | |
| Danger et al. | Improving the big mac attack on elliptic curve cryptography | |
| JPWO2009118795A1 (ja) | サイドチャネル攻撃に対する耐タンパ性を有する暗号処理方法 | |
| Kim et al. | Practical second‐order correlation power analysis on the message blinding method and its novel countermeasure for RSA | |
| US20100287384A1 (en) | Arrangement for and method of protecting a data processing device against an attack or analysis | |
| Kuzu et al. | New cross correlation attack methods on the montgomery ladder implementation of RSA | |
| EP2504757B1 (en) | Exponentiation system | |
| Mishra | Pipelined computation of scalar multiplication in elliptic curve cryptosystems | |
| Abarzúa et al. | Complete atomic blocks for elliptic curves in jacobian coordinates over prime fields | |
| Zhang et al. | Efficient elliptic curve scalar multiplication algorithms resistant to power analysis | |
| Lim | A new method for securing elliptic scalar multiplication against side-channel attacks | |
| US20150092940A1 (en) | Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for Simple-Side Channel Attacks and C-Safe-Fault Attacks for Right-to-Left Algorithms | |
| Miyaji et al. | How to enhance the security on the least significant bit | |
| Takemura et al. | ECC Atomic Block with NAF against Strong Side-Channel Attacks on Binary Curves | |
| Wang et al. | A new SPA attack on ECC with regular point multiplication | |
| HK1176423B (en) | Modular exponentiation method and device resistant against side-channel attacks | |
| KR20120127235A (ko) | 부-채널 공격에 내성이 있는 모듈러 지수화 방법 및 디바이스 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FG | Grant or registration |