@inproceedings{48838ba1ed514903b77459f016916c37,
title = "A DPA countermeasure by randomized frobenius decomposition",
abstract = "There have been various methods to prevent DPA (Differential Power Analysis) on elliptic curve cryptosystems. As for the curves with efficient endomorphisms, Hasan suggested several countermeasures on anomalous binary curves, and Ciet, Quisquater and Sica proposed a countermeasure on GLV curves. Ciet et al.'s method is based on random decomposition of a scalar, and it is a two-dimensional generalization of Coron's method. Hasan's and Ciet et al.'s countermeasures are applied only to a small class of elliptic curves. In this paper, we enlarge the class of DPA-resistant curves by proposing a DPA countermeasure applicable to any curve where the Frobenius expansion method can be used. Our analysis shows that our countermeasure can produce a probability of collision around script O sign(2-20) with only 15.4-34.0% extra computation for scalar multiplications on various practical settings.",
keywords = "DPA, Elliptic curve, Frobenius expansion, GLV decomposition, Scalar multiplication",
author = "Park, {Tae Jun} and Lee, {Mun Kyu} and Dowon Hong and Kyoil Chung",
year = "2005",
language = "English",
isbn = "3540310126",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "271--282",
booktitle = "Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers",
note = "6th International Workshop on Information Security Applications, WISA 2005 ; Conference date: 22-08-2005 Through 24-08-2005",
}