ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Dong-Guk Han, Sung-Kyoung Kim, Ho Won Kim, Kyo IL Chung, Jong In Lim
Issue Date
2007-05
Citation
International Conference on Information Security Practice and Experience (ISPEC) 2007 (LNCS 4464), v.4464, pp.238-253
Publisher
Springer
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-540-72163-5_19
Abstract
This paper presents two recoding methods for a radix-r representation of a secret scalar which are resistant to SPA. These recoding methods are left-to-right so they can be interleaved with a left-to-right scalar multiplication, removing the need to store both a scalar and its recoding. Next, we show the ideas of left-to-right recoding for a radix-r representation lead to simplified recoding methods for a binary representation. In general our proposed algorithms asymptotically require additional (w + 1)-digit and w-bit of RAM in the case of width-w radix-r representation and a special case when r = 2, respectively, which is independent from the digit (bit) size n of the scalar and considerably reduces the required space comparing with previous methods which require n-digit (bit) of RAM additional memory to store the recoded scalar. Consequently, thanks to its left-to-right nature, the scalar multiplication based on it is by far more convenient with respect to memory consumption. © Springer-Verlag Berlin Heidelberg 2007.
KSP Keywords
Binary representation, Embedded devices, Radix-r representation, Scalar multiplication, memory consumption