You are looking at a specific version 20131121:191137 of this paper. See the latest version.

Paper 2013/764

Dynamic Countermeasure Against the Zero Power Analysis

Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache

Abstract

Elliptic Curve Cryptography can be vulnerable to Side-Channel Attacks, such as the Zero Power Analysis (ZPA). This attack takes advantage of the occurrence of special points that bring a zero-value when computing a doubling or an addition of points. This paper consists in analysing this attack. Some properties of the said special points are explicited. A novel dynamic countermeasure is described. The elliptic curve formul\ae{} are updated depending on the elliptic curve and the provided base point.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Elliptic Curve CryptographySide-Channel AnalysisZero Power AnalysisZero-Value PointsDynamic CountermeasureJacobi Symbol.
Contact author(s)
cedric murdica @ gmail com
History
2013-11-21: received
Short URL
https://ia.cr/2013/764
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.