In this paper we show that a number of existing methods for side-channel defence are essentially the same techniques presented in different contexts. By abstracting this technique, we present necessary conditions which need to be satisfied for it to be successful in preventing side-channel analysis. We also show that concrete application of the technique via randomised field representation produces more efficient implementations than application of the technique via randomised projective coordinates.
|Journal||IET Information Security|
|Publication status||Published - 2008|