Main Page
About FCIT
History
Strategy
Administration>
Current Administration
Prevouis Administration
Organization Strucutre
Industrial Advisory Board
PhotoAlbum
Lab Guides
Departments
Computer Science
Information Technology
Information Systems
Academics
Bachelor Programs
Graduate Programs
Executive Programs
Academic Calendar
Admission
Bachelor Degree & Transferring
Admission from the Foundation Year
Transferring to the Faculty
Graduate Studies
Graduate Programs
Executive Programs
Scientific Research
Groups and Units
Research Groups
Research Interests
Distinguished Scientists Program
Faculty Journal
Faculty and Staff
Faculty
CS Department
IT Department
IS Department
Staff
Accreditation Integration & Management System (AIM
Development and Quality Unit
Work at FCIT
Capabilities Under the Spotlight
Code of Ethics
Students
Bachelor
ِAcademic Services
Preparatory Year Courses
Students' Guide
Academic Advising
Laboratories and Facilities
Student rights and duties
Graduate
Polices and Regulations
Students' Guide
Student's Handbook
New Student Orientation
Templates of proposals and theses for masters and
Courses
CS Program
IT Program
IS Program
Alumni Registration
Students Activities
Entrepreneurship Club
Cybersecurity Club
Data Science Club
Programming Club
Community
Industrial partnerships
Cisco Academy
Microsoft Academy
Oracle Academy
Files
Researches
Contact Us
عربي
English
About
Admission
Academic
Research and Innovations
University Life
E-Services
Search
Faculty of Computing and Information Technology
Document Details
Document Type
:
Article In Conference
Document Title
:
Resisting Side Channel Attack on Elliptic Curve Cryptosystem
طريقة لصد الهجوم عبر القنوات الجانبية على نظام التشفير الخاص بالمنحنى الإهليجي
Subject
:
Side Channel Attack
Document Language
:
English
Abstract
:
In this paper several elliptic curve multiplication algorithms which are secure against Side Channel Attacks (SCA) have been described. Also countermeasures against Differential Power Analysis have been specified. Subsequently uses Here Coron’s dummy algorithm for scalar multiplication which is the countermeasure against Simple Power Analysis and discuss about the efficiency of the algorithm in term of addition, subtraction, Multiplication and inverse operations.
Conference Name
:
IEEE International Conference on Security Science and Technology (ICSST 2011), China,
Duration
:
From : 1432 AH - To : 1432 AH
From : 2011 AD - To : 2011 AD
Publishing Year
:
1432 AH
2011 AD
Number Of Pages
:
5
Article Type
:
Article
Conference Place
:
China
Organizing Body
:
IEEE International Conference on Security Science and Technology (ICSST 2011)
Added Date
:
Saturday, January 7, 2012
Researchers
Researcher Name (Arabic)
Researcher Name (English)
Researcher Type
Dr Grade
Email
جبراكاش كار
Kar, Jayaprakash
Researcher
Doctorate
jayaprakashkar@yahoo.com
Files
File Name
Type
Description
31993.pdf
pdf
Resisting Side Channel Attack on Elliptic Curve Cryptosystem
Back To Researches Page