Attacking Exponent Blinding in RSA without CRT
From MaRDI portal
Publication:4905046
DOI10.1007/978-3-642-29912-4_7zbMATH Open1352.94026OpenAlexW1774267729MaRDI QIDQ4905046FDOQ4905046
Authors: Sven Bauer
Publication date: 14 February 2013
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-29912-4_7
Recommendations
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
- Attacking noisy secret CRT-RSA exponents in binary method
- Defeating RSA multiply-always and message blinding countermeasures
- Partial key exposure attack on CRT-RSA
- Partial key exposure attack on short secret exponent CRT-RSA
- Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents
- Public Key Cryptography - PKC 2006
- New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
Cited In (11)
- Weaknesses in current RSA signature schemes
- Defeating RSA multiply-always and message blinding countermeasures
- Exponent blinding does not always lift (partial) spa resistance to higher-level security
- Title not available (Why is that?)
- Title not available (Why is that?)
- Progress in Cryptology – Mycrypt 2005
- Public Key Cryptography - PKC 2006
- Attacking embedded ECC implementations through CMOV side channels
- Attacking unbalanced RSA-CRT using SPA.
- Power Attack on Small RSA Public Exponent
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
This page was built for publication: Attacking Exponent Blinding in RSA without CRT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4905046)