Power Attack on Small RSA Public Exponent
From MaRDI portal
Publication:3522153
DOI10.1007/11894063_27zbMATH Open1352.94035OpenAlexW1495728876MaRDI QIDQ3522153FDOQ3522153
Authors: Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, F. Valette
Publication date: 29 August 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11894063_27
Recommendations
Cited In (16)
- Title not available (Why is that?)
- Distinguishing Multiplications from Squaring Operations
- A New Side-Channel Attack on RSA Prime Generation
- On the use of RSA public exponent to improve implementation efficiency and side-channel resistance
- Title not available (Why is that?)
- Weaknesses in current RSA signature schemes
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Low-exponent RSA with related messages
- Exponent blinding does not always lift (partial) spa resistance to higher-level security
- Title not available (Why is that?)
- Progress in Cryptology – Mycrypt 2005
- Correlation analysis against protected SFM implementations of RSA
- Attacking unbalanced RSA-CRT using SPA.
- ROSETTA for single trace analysis
- Sliding right into disaster: left-to-right sliding windows leak
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
This page was built for publication: Power Attack on Small RSA Public Exponent
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3522153)