2016
DOI: 10.1007/978-3-319-31875-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Secure Binary Field Multiplication

Abstract: Binary field multiplication is the most fundamental building block of binary field Elliptic Curve Cryptography (ECC) and Galois/Counter Mode (GCM). Both bit-wise scanning and Look-Up Table (LUT) based methods are commonly used for binary field multiplication. In terms of Side Channel Attack (SCA), bit-wise scanning exploits insecure branch operations which leaks information in a form of timing and power consumption. On the other hands, LUT based method is regarded as a relatively secure approach because LUT ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Therefore, on 8-bit AVR, the major goal of existing researches on binary field multiplication methods is minimizing redundant memory accesses by optimizing the use of the available registers. [9] Enhanced Karatsuba Block-Comb ECC GF(2 233 ) 6896 none Ziu et al [11,15] Masked Block-Comb GCM GF(2 128 ) 14,445 TA Seo et al [10] Block-Comb with Dummy XOR and ILA GCM GF(2 128 ) 5675 SPA, TA…”
Section: Multiplication Methods Over Gf(2 M ) On 8-bit Avr Mcusmentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore, on 8-bit AVR, the major goal of existing researches on binary field multiplication methods is minimizing redundant memory accesses by optimizing the use of the available registers. [9] Enhanced Karatsuba Block-Comb ECC GF(2 233 ) 6896 none Ziu et al [11,15] Masked Block-Comb GCM GF(2 128 ) 14,445 TA Seo et al [10] Block-Comb with Dummy XOR and ILA GCM GF(2 128 ) 5675 SPA, TA…”
Section: Multiplication Methods Over Gf(2 M ) On 8-bit Avr Mcusmentioning
confidence: 99%
“…However, they are vulnerable to side channel attacks, which uses information about the memory address [11,12,19] owing to the large number of resulted memory accesses. In [11,15], Liu et al successfully analyzed the wLtR Comb multiplication technique with a sort of horizontal correlation analysis [12]. Namely, they could get the indices used for accessing LUT by using the correlation between power consumption traces from building up the Lookup table and referencing the LUT element during the process of a multiplication.…”
Section: Look-up Table-based Methodsmentioning
confidence: 99%
See 2 more Smart Citations