Attacking Exponent Blinding in RSA without CRT
From MaRDI portal
Publication:4905046
Recommendations
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
- Attacking noisy secret CRT-RSA exponents in binary method
- Defeating RSA multiply-always and message blinding countermeasures
- Partial key exposure attack on CRT-RSA
- Partial key exposure attack on short secret exponent CRT-RSA
- Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents
- Public Key Cryptography - PKC 2006
- New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
Cited in
(20)- ROSETTA for single trace analysis
- scientific article; zbMATH DE number 2085435 (Why is no real title available?)
- Correlation analysis against protected SFM implementations of RSA
- Weaknesses in current RSA signature schemes
- Public Key Cryptography - PKC 2006
- Progress in Cryptology – Mycrypt 2005
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA
- Correlated extra-reductions defeat blinded regular exponentiation
- Attacking embedded ECC implementations through CMOV side channels
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding
- Power Attack on Small RSA Public Exponent
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
- Attacking randomized exponentiations using unsupervised learning
- Attacking unbalanced RSA-CRT using SPA.
- A secure exponentiation algorithm resistant to a combined attack on RSA implementation
- Exponent blinding does not always lift (partial) spa resistance to higher-level security
- scientific article; zbMATH DE number 1979287 (Why is no real title available?)
- Defeating RSA multiply-always and message blinding countermeasures
- On the use of RSA public exponent to improve implementation efficiency and side-channel resistance
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
This page was built for publication: Attacking Exponent Blinding in RSA without CRT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4905046)