Key Bit-Dependent Side-Channel Attacks on Protected Binary Scalar Multiplication <sup>†</sup>

Binary scalar multiplication, which is the main operation of elliptic curve cryptography, is vulnerable to side-channel analysis. It is especially vulnerable to side-channel analysis using power consumption and electromagnetic emission patterns. Thus, various countermeasures have been reported. Howe...

Full description

Bibliographic Details
Main Authors: Bo-Yeon Sim, Junki Kang, Dong-Guk Han
Format: Article
Language:English
Published: MDPI AG 2018-11-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/8/11/2168