Secure signed radix-r recoding methods for constrained-embedded devices

Dong Guk Han, Sung Kyoung Kim, Ho Won Kim, Kyo Il Chung, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents two recoding methods for a radix-r representation of a secret scalar which are resistant to SPA. These recoding methods are left-to-right so they can be interleaved with a left-to-right scalar multiplication, removing the need to store both a scalar and its recoding. Next, we show the ideas of left-to-right recoding for a radix-r representation lead to simplified recoding methods for a binary representation. In general our proposed algorithms asymptotically require additional (w + 1)-digit and w-bit of RAM in the case of width-w radix-r representation and a special case when r = 2, respectively, which is independent from the digit (bit) size n of the scalar and considerably reduces the required space comparing with previous methods which require n-digit (bit) of RAM additional memory to store the recoded scalar. Consequently, thanks to its left-to-right nature, the scalar multiplication based on it is by far more convenient with respect to memory consumption.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages238-253
Number of pages16
Volume4464 LNCS
Publication statusPublished - 2007 Dec 20
Event3rd International Conference on Information Security Practice and Experience, ISPEC 2007 - Hong Kong, Hong Kong
Duration: 2007 May 72007 May 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4464 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other3rd International Conference on Information Security Practice and Experience, ISPEC 2007
CountryHong Kong
CityHong Kong
Period07/5/707/5/9

Keywords

  • Elliptic curve cryptosystems
  • Left-to-right
  • Pairingbased cryptosystems
  • Right-to-left
  • Side channel attacks

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Secure signed radix-r recoding methods for constrained-embedded devices'. Together they form a unique fingerprint.

  • Cite this

    Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I., & Lim, J. I. (2007). Secure signed radix-r recoding methods for constrained-embedded devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4464 LNCS, pp. 238-253). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4464 LNCS).