Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

First-order side channel attacks on Zhang's countermeasures

Full metadata record
DC Field Value Language
dc.contributor.authorKim, HeeSeok-
dc.contributor.authorHan, Dong-Guk-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-09-07T08:24:26Z-
dc.date.available2021-09-07T08:24:26Z-
dc.date.created2021-06-19-
dc.date.issued2011-09-15-
dc.identifier.issn0020-0255-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/111583-
dc.description.abstractZhang's three countermeasures are known to be secure against certain first-order side channel attacks such as differential power analysis and correlation power analysis. This security comes from the countermeasures use of random points to blind the message and random integers to blind the secret scalar. In this paper, we propose first-order side channel attack methods that can perfectly break these three countermeasures. Even though Zhang's countermeasures use random points and random integers our attacks are made possible by the fact that intermediate values computed by these countermeasures are dependent on specific values that we can guess. The experimental results verify that the proposed attack methods can successfully break existing countermeasures. (C) 2011 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectPOWER ANALYSIS-
dc.subjectSIGNATURES-
dc.titleFirst-order side channel attacks on Zhang's countermeasures-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, HeeSeok-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.1016/j.ins.2011.04.049-
dc.identifier.scopusid2-s2.0-80955178935-
dc.identifier.wosid000292785200020-
dc.identifier.bibliographicCitationINFORMATION SCIENCES, v.181, no.18, pp.4051 - 4060-
dc.relation.isPartOfINFORMATION SCIENCES-
dc.citation.titleINFORMATION SCIENCES-
dc.citation.volume181-
dc.citation.number18-
dc.citation.startPage4051-
dc.citation.endPage4060-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusPOWER ANALYSIS-
dc.subject.keywordPlusSIGNATURES-
dc.subject.keywordAuthorSide channel attacks-
dc.subject.keywordAuthorCountermeasure-
dc.subject.keywordAuthorDifferential power analysis-
dc.subject.keywordAuthorElliptic curve-
dc.subject.keywordAuthorScalar multiplication-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE