@inproceedings{9b33720e114a486d84d3ac7a75d05927,
title = "Algorithm-based countermeasures against power analysis attacks for public-key cryptography SM2",
abstract = "SM2 is a public-key cryptography algorithm which is based on elliptic curves. Since the side channel leakage of devices can be used to deduce the information of secret keys, algorithms to implement SM2 need to be improved. In this paper, we propose an initialized masking scalar multiplication algorithm (IMSM), a modified atomic point doubling and point addition algorithm (MADA), and a transformed formula countermeasure (TFCS). Analysis shows they can resist Simple Power Analysis (SPA), Differential Power Analysis and Template Attacks. IMSM and MADA have been verified to resist SPA on FPGA board successfully. Compared to Binary Expansion with RIP algorithm, 28.6% calculations can be saved when the scalar is divided into four parts, which is rather fast.",
keywords = "Elliptic curve cryptography, IMSM, MADA, SM2, TFCS",
author = "Xiaowei Han and Beibei Wang and An Wang and Liji Wu and Woogeun Rhee",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 10th International Conference on Computational Intelligence and Security, CIS 2014 ; Conference date: 15-11-2014 Through 16-11-2014",
year = "2015",
month = jan,
day = "20",
doi = "10.1109/CIS.2014.116",
language = "English",
series = "Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "435--439",
booktitle = "Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014",
address = "United States",
}