Attacking Exponent Blinding in RSA without CRT
From MaRDI portal
Publication:4905046
DOI10.1007/978-3-642-29912-4_7zbMATH Open1352.94026OpenAlexW1774267729MaRDI QIDQ4905046FDOQ4905046
Authors: Sven Bauer
Publication date: 14 February 2013
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-29912-4_7
Recommendations
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
- Attacking noisy secret CRT-RSA exponents in binary method
- Defeating RSA multiply-always and message blinding countermeasures
- Partial key exposure attack on CRT-RSA
- Partial key exposure attack on short secret exponent CRT-RSA
- Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents
- Public Key Cryptography - PKC 2006
- New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
Cited In (20)
- On the use of RSA public exponent to improve implementation efficiency and side-channel resistance
- Weaknesses in current RSA signature schemes
- Defeating RSA multiply-always and message blinding countermeasures
- A secure exponentiation algorithm resistant to a combined attack on RSA implementation
- Exponent blinding does not always lift (partial) spa resistance to higher-level security
- Title not available (Why is that?)
- Title not available (Why is that?)
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
- Progress in Cryptology – Mycrypt 2005
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding
- Public Key Cryptography - PKC 2006
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA
- Correlated extra-reductions defeat blinded regular exponentiation
- Attacking embedded ECC implementations through CMOV side channels
- Correlation analysis against protected SFM implementations of RSA
- Attacking unbalanced RSA-CRT using SPA.
- Attacking randomized exponentiations using unsupervised learning
- Power Attack on Small RSA Public Exponent
- ROSETTA for single trace analysis
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
This page was built for publication: Attacking Exponent Blinding in RSA without CRT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4905046)