SPA countermeasure based on unsigned left-to-right recodings

Sung Kyoung Kim, Dong Guk Han, Ho Won Kim, Kyo I.L. Chung, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Vuillaume-Okeya presented unsigned recoding methods for protecting modular exponentiations against side channel attacks, which are suitable for tamper-resistant implementations of RSA or DSA which does not benefit from cheap inversions. This paper describes new recoding methods for producing SPA-resistant unsigned representations which are scanned from left to right (i.e., from the most significant digit to the least significant digit) contrary to the previous ones. Our contributions are as follows; (1) SPAresistant unsigned left-to-right recoding with general width-w, (2) special case when w = 1, i.e., unsigned binary representation using the digit set {1,2}. These methods reduce the memory required to perform the modular exponentiation gk.

Original languageEnglish
Title of host publicationAutonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings
PublisherSpringer Verlag
Pages286-295
Number of pages10
ISBN (Print)9783540735465
DOIs
Publication statusPublished - 2007
Event4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007 - Hong Kong, China
Duration: 2007 Jul 112011 Jul 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4610 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007
CountryChina
CityHong Kong
Period07/7/1111/7/13

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'SPA countermeasure based on unsigned left-to-right recodings'. Together they form a unique fingerprint.

Cite this