Method and system for protecting a cryptography device

作者: M. Michaël Adjedj

DOI:

关键词:

摘要: The method involves applying (20) invertible homomorphism (Mi) e.g. homomorphic encryption, to secret data (Di) before application (22) of cryptographic operation i.e. mathematical (Oi), where the is compatible with internal composition law. Another homomorphism, inverse applied (24) after operation. a result homomorphism. latter An independent claim also included for device protecting cryptography circuit against attacks detect utilized during execution algorithm by circuit.

参考文章(5)
Nigel P. Smart, An Analysis of Goubin’s Refined Power Analysis Attack cryptographic hardware and embedded systems. pp. 281- 290 ,(2003) , 10.1007/978-3-540-45238-6_23
Michel Douguet, Vincent Dupaquis, Representation change of a point on an elliptic curve ,(2008)
Stanley Chow, Phil Eisen, Harold Johnson, Paul C. van Oorschot, A White-Box DES Implementation for DRM Applications digital rights management. pp. 1- 15 ,(2002) , 10.1007/978-3-540-44993-5_1
A. C.-F. Chan, Symmetric-Key Homomorphic Encryption for Encrypted Data Processing international conference on communications. pp. 774- 778 ,(2009) , 10.1109/ICC.2009.5199505
Hyungjick Lee, J. Alves-Foss, S. Harrison, The use of encrypted functions for mobile agent security hawaii international conference on system sciences. pp. 90297- ,(2004) , 10.1109/HICSS.2004.1265700