Thwarting side-channel analysis against RSA cryptosystems with additive blinding
From MaRDI portal
Publication:778376
DOI10.1016/J.INS.2017.05.035zbMATH Open1435.94134OpenAlexW2619172401MaRDI QIDQ778376FDOQ778376
Authors: Heeseok Kim
Publication date: 2 July 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2017.05.035
Recommendations
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- On the importance of eliminating errors in cryptographic computations
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- The doubling attack -- why upwards is better than downwards.
- First-order side channel attacks on Zhang's countermeasures
- Fault attacks on the Montgomery powering ladder
- Continuous leakage-resilient certificate-based encryption
- ROSETTA for single trace analysis
- Recovering CRT-RSA secret keys from message reduced values with side-channel analysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Horizontal Correlation Analysis on Exponentiation
- A practical countermeasure against address-bit differential power analysis.
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
- Progress in Cryptology – Mycrypt 2005
- Horizontal collision correlation attack on elliptic curves
Cited In (3)
This page was built for publication: Thwarting side-channel analysis against RSA cryptosystems with additive blinding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778376)