Exponent blinding does not always lift (partial) spa resistance to higher-level security
From MaRDI portal
Publication:3011304
Recommendations
- Attacking Exponent Blinding in RSA without CRT
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA
- ROSETTA for single trace analysis
- Public Key Perturbation of Randomized RSA Implementations
Cites work
- scientific article; zbMATH DE number 2085436 (Why is no real title available?)
- scientific article; zbMATH DE number 1979280 (Why is no real title available?)
- scientific article; zbMATH DE number 1504818 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- scientific article; zbMATH DE number 233957 (Why is no real title available?)
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- Correcting errors in RSA private keys
- Power Attack on Small RSA Public Exponent
- Progress in Cryptology – Mycrypt 2005
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(3)
This page was built for publication: Exponent blinding does not always lift (partial) spa resistance to higher-level security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3011304)