An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5

Abstract

In order to provide security the electronic devices and their execution systems contain implementations of cryptographic algorithms. This paper explains basic level of side channel attacks and their countermeasure. These countermeasures show the way, how to trounce the side channel attacks and describe an efficient approach to overcome the side channel attacks. Based on this approach, the paper analyzes functions ver many other countermeasures such as Simple Power nalysis, Differential Power Analysis; Data bit Differential Power Analysis and Zero Value Attacks.

Authors and Affiliations

M. Prabu , R. Shanmugalakshmi

Keywords

Related Articles

Wavelet Features Based War Scene Classification using Artificial Neural Networks

This paper addresses the problem of war scene classification. Scene classification underlies many problems in visual perception such as object recognition and environment navigation. Scene classification, the classificat...

A Comprehensive Assessment of Object-Oriented Software Systems Using Metrics Approach

Demand for efficient software is increasing day by day and bject-oriented design technique became able to fulfill this demand because it is the most powerful mechanism to develop efficient software systems. It can not o...

SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH

Billions of lines of code are currently running in Legacy systems, mainly running machine critical systems. Large organizations and as well as small organizations extensively rely on IT infrastructure as the backbone. Th...

MRI Brain Image Segmentation Algorithm Using Watershed Transform and Kernel Fuzzy C-Means Clustering on Level Set Method

A new method for image segmentation is proposed in this paper, which combines the watershed transform, KFCM and level set method. The watershed transform is first used to presegment the image so as to get the initial par...

Mining Weighted Association Rule using FP – tree

The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same si...

Download PDF file
  • EP ID EP129442
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

M. Prabu, R. Shanmugalakshmi (2010). An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography. International Journal on Computer Science and Engineering, 2(5), 1492-1495. https://europub.co.uk/articles/-A-129442