Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
From MaRDI portal
Publication:5452251
DOI10.1007/978-3-540-77360-3_8zbMath1154.94368OpenAlexW1515200869MaRDI QIDQ5452251
Benoit Feix, Karine Villegas, Frederic Amiel
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_8
Public key cryptographyexponentiationreverse engineeringside-channel analysisarithmetic coprocessors
Related Items (8)
Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks ⋮ Toward reverse engineering on secret \(S\)-boxes in block ciphers ⋮ Combined Attack on CRT-RSA ⋮ On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance ⋮ Defeating RSA Multiply-Always and Message Blinding Countermeasures ⋮ Securing RSA against Fault Analysis by Double Addition Chain Exponentiation ⋮ Distinguishing Multiplications from Squaring Operations ⋮ Thwarting side-channel analysis against RSA cryptosystems with additive blinding
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Modular Multiplication Without Trial Division
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- SCARE of the DES
- Elliptic Curve Cryptosystems
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Applied Cryptography and Network Security
This page was built for publication: Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms