Abstract

This paper presents an efficient scheme for computing elliptic curve scalar multiplication that uses side-channel atomicity to resist against SPA attacks. The inherent parallelism within point operations is exploited to perform parallel computations of atomic blocks within the same point operation. The computations of atomic blocks of subsequent point operations are then overlapped to increase the performance. Randomising the scalar multiplier and the projective coordinates are applied together to immunise the scheme against DPA attacks. The results show that the proposed scheme is highly efficient in comparison with the pipelined scheme of Mishra (2006), which outperformed previous schemes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call