Reduce-by-feedback: timing resistant and DPA-aware modular multiplication plus: how to break RSA by DPA
From MaRDI portal
Publication:4649792
DOI10.1007/978-3-642-33027-8_27zbMATH Open1294.94083OpenAlexW159135798MaRDI QIDQ4649792FDOQ4649792
Authors: Michael Vielhaber
Publication date: 13 November 2012
Published in: Cryptographic Hardware and Embedded Systems – CHES 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8_27
Recommendations
timing analysisdifferential power analysisMontgomery multiplicationmodular multiplicationReduce-by-Feedback
Cited In (3)
This page was built for publication: Reduce-by-feedback: timing resistant and DPA-aware modular multiplication plus: how to break RSA by DPA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4649792)