University of Concepción - Chile
Elliptic Curve Cryptography (ECC) has been adopted in many systems because it requires shorter keys than traditional public-key algorithms in primary fields. However, power analysis attacks can exploit the power consumption of ECC devices to retrieve secret keys. In this paper, the authors propose an efficient window-based countermeasure that is secure against existing power analysis attacks. Compared to previous countermeasures, their method has low memory overhead, requiring only a table of w+ 1 entry when the window size is w bits. It also has better performance than many algorithms that perform one point addition or subtraction for every bit in the scalar.