WEKO3
アイテム
{"_buckets": {"deposit": "bc507ccb-8e30-46cc-acf6-169c42b5a24a"}, "_deposit": {"created_by": 13, "id": "8895", "owners": [13], "pid": {"revision_id": 0, "type": "depid", "value": "8895"}, "status": "published"}, "_oai": {"id": "oai:uec.repo.nii.ac.jp:00008895", "sets": ["6"]}, "author_link": ["24218", "24217", "24216"], "item_10001_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2016-07-01", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "7", "bibliographicPageEnd": "1333", "bibliographicPageStart": "1323", "bibliographicVolumeNumber": "E99.A", "bibliographic_titles": [{}, {"bibliographic_title": "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences", "bibliographic_titleLang": "en"}]}]}, "item_10001_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric between two operands. The asymmetric leakage is verified with experiments on FPGA and micro-controller platforms. Moreover, we show an experimental result in which success and failure of the attack is determined by the order of operands. Therefore, designing operand order can be a cost-effective countermeasure. Meanwhile we also show a case in which a particular countermeasure becomes ineffective when the asymmetric leakage is considered. In addition to the above main contribution, an extension of the attack by Hanley et al. using the signal-processing technique of Big Mac Attack is presented.", "subitem_description_type": "Abstract"}]}, "item_10001_publisher_8": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEICE"}]}, "item_10001_relation_14": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isIdenticalTo", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1587/transfun.E99.A.1323", "subitem_relation_type_select": "DOI"}}]}, "item_10001_relation_17": {"attribute_name": "関連サイト", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "http://search.ieice.org/index.html", "subitem_relation_type_select": "URI"}}]}, "item_10001_rights_15": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "copyright©2016 IEICE"}]}, "item_10001_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0916-8508", "subitem_source_identifier_type": "ISSN"}]}, "item_10001_version_type_20": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "SUGAWARA, Takeshi", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "24216", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "SUZUKI, Daisuke", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "24217", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "SAEKI, Minoru", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "24218", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-01-17"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "e99-a_7_1323.pdf", "filesize": [{"value": "1.8 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1800000.0, "url": {"label": "e99-a_7_1323", "url": "https://uec.repo.nii.ac.jp/record/8895/files/e99-a_7_1323.pdf"}, "version_id": "95c2c013-f2e5-425f-b851-8d724d4e542a"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "RSA", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "side-channel attack", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "collision attack", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Montgomery multiplication", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack", "subitem_title_language": "en"}]}, "item_type_id": "10001", "owner": "13", "path": ["6"], "permalink_uri": "https://uec.repo.nii.ac.jp/records/8895", "pubdate": {"attribute_name": "公開日", "attribute_value": "2019-01-17"}, "publish_date": "2019-01-17", "publish_status": "0", "recid": "8895", "relation": {}, "relation_version_is_last": true, "title": ["Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack"], "weko_shared_id": -1}
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack
https://uec.repo.nii.ac.jp/records/8895
https://uec.repo.nii.ac.jp/records/889566cd1fd2-16cf-4a76-b63c-1be833d3d25e
名前 / ファイル | ライセンス | アクション |
---|---|---|
e99-a_7_1323 (1.8 MB)
|
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2019-01-17 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
言語 | en | |||||
主題 | RSA | |||||
キーワード | ||||||
言語 | en | |||||
主題 | side-channel attack | |||||
キーワード | ||||||
言語 | en | |||||
主題 | collision attack | |||||
キーワード | ||||||
言語 | en | |||||
主題 | Montgomery multiplication | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
SUGAWARA, Takeshi
× SUGAWARA, Takeshi× SUZUKI, Daisuke× SAEKI, Minoru |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric between two operands. The asymmetric leakage is verified with experiments on FPGA and micro-controller platforms. Moreover, we show an experimental result in which success and failure of the attack is determined by the order of operands. Therefore, designing operand order can be a cost-effective countermeasure. Meanwhile we also show a case in which a particular countermeasure becomes ineffective when the asymmetric leakage is considered. In addition to the above main contribution, an extension of the attack by Hanley et al. using the signal-processing technique of Big Mac Attack is presented. | |||||
書誌情報 |
en : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 巻 E99.A, 号 7, p. 1323-1333, 発行日 2016-07-01 |
|||||
出版者 | ||||||
出版者 | IEICE | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0916-8508 | |||||
DOI | ||||||
関連タイプ | isIdenticalTo | |||||
識別子タイプ | DOI | |||||
関連識別子 | 10.1587/transfun.E99.A.1323 | |||||
権利 | ||||||
権利情報 | copyright©2016 IEICE | |||||
関連サイト | ||||||
識別子タイプ | URI | |||||
関連識別子 | http://search.ieice.org/index.html | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |