Square Always Exponentiation
From MaRDI portal
Publication:3104721
DOI10.1007/978-3-642-25578-6_5zbMath1291.94069OpenAlexW127775163MaRDI QIDQ3104721
Georges Gagnerot, Christophe Clavier, Vincent Verneuil, Mylène Roussellet, Benoit Feix
Publication date: 16 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25578-6_5
Related Items
The distributions of individual bits in the output of multiplicative operations, Recovering secrets from prefix-dependent leakage, Combined Attack on CRT-RSA
Cites Work
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Checking before output may not be enough against fault-based cryptanalysis
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Combined Implementation Attack Resistant Exponentiation
- Distinguishing Multiplications from Squaring Operations
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- The Doubling Attack – Why Upwards Is Better than Downwards
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item