Exponent blinding does not always lift (partial) spa resistance to higher-level security
From MaRDI portal
Publication:3011304
DOI10.1007/978-3-642-21554-4_5zbMATH Open1352.94058OpenAlexW2104435792MaRDI QIDQ3011304FDOQ3011304
Authors: Werner Schindler, Kouichi Itoh
Publication date: 28 June 2011
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21554-4_5
Recommendations
- Attacking Exponent Blinding in RSA without CRT
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA
- ROSETTA for single trace analysis
- Public Key Perturbation of Randomized RSA Implementations
Cites Work
- Title not available (Why is that?)
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Progress in Cryptology – Mycrypt 2005
- Title not available (Why is that?)
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- Correcting errors in RSA private keys
- Power Attack on Small RSA Public Exponent
Cited In (3)
This page was built for publication: Exponent blinding does not always lift (partial) spa resistance to higher-level security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3011304)