Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
From MaRDI portal
Publication:3623066
DOI10.1007/978-3-642-00862-7_31zbMath1237.94091OpenAlexW2099629555MaRDI QIDQ3623066
Publication date: 29 April 2009
Published in: Topics in Cryptology – CT-RSA 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00862-7_31
Related Items
Combined Attack on CRT-RSA, On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance, RSA cryptosystem with fuzzy set theory for encryption and decryption
Cites Work
- Chinese remaindering based cryptosystems in the presence of faults
- Analysis of sliding window techniques for exponentiation
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Checking before output may not be enough against fault-based cryptanalysis
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A method for obtaining digital signatures and public-key cryptosystems
- A Survey of Fast Exponentiation Methods
- The Doubling Attack – Why Upwards Is Better than Downwards
- A Practical Countermeasure against Address-Bit Differential Power Analysis
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
- Perturbating RSA Public Keys: An Improved Attack
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item