TY - JOUR
N2 - Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography. Most of these models allow to use fast and complete arithmetic which is especially convenient in fast implementations that are side-channel attacks resistant. Montgomery, Edwards and twisted Edwards curves have always order of group of rational points divisible by 4. Huff’s curves have always order of rational points divisible by 8. Moreover, sometimes to get fast and efficient implementations one can choose elliptic curve with even bigger cofactor, for example 16. Of course the bigger cofactor is, the smaller is the security of cryptosystem which uses such elliptic curve. In this article will be checked what influence on the security has form of cofactor of elliptic curve and will be showed that in some situations elliptic curves with cofactor divisible by 2m are vulnerable for combined small subgroups and side-channel attacks.
L1 - http://journals.pan.pl/Content/110215/PDF/28.pdf
L2 - http://journals.pan.pl/Content/110215
PY - 2019
IS - No 2
EP - 203–209
DO - 10.24425/ijet.2019.126302
KW - Small subgroups attack
KW - side-channel attack
KW - alternative models of elliptic curves
A1 - Wrońska, Michał
PB - Polish Academy of Sciences Committee of Electronics and Telecommunications
VL - vol. 65
DA - 2019.06.13
T1 - Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m
SP - 203–209
UR - http://journals.pan.pl/dlibra/publication/edition/110215
T2 - International Journal of Electronics and Telecommunications
ER -