Proceedings of the 5th Workshop on Embedded Systems Security 2010
DOI: 10.1145/1873548.1873556
|View full text |Cite
|
Sign up to set email alerts
|

A new CRT-RSA algorithm resistant to powerful fault attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Ultimately, it can ensure that the final result is randomized and cannot be used to break the system even if a proper fault is induced. Typical fault propagation type countermeasures are , , Blömer et al (2003), Ha et al (2008), Ebeid and Lambert (2010) and Ciet and Joye (2005) countermeasures. However, this class requires more computational overhead such as modular arithmetic than the checking procedure, since it has to compute complex operations instead of a comparison operation such as the 'if' statement for detecting faults.…”
Section: Fault Propagationmentioning
confidence: 99%
See 3 more Smart Citations
“…Ultimately, it can ensure that the final result is randomized and cannot be used to break the system even if a proper fault is induced. Typical fault propagation type countermeasures are , , Blömer et al (2003), Ha et al (2008), Ebeid and Lambert (2010) and Ciet and Joye (2005) countermeasures. However, this class requires more computational overhead such as modular arithmetic than the checking procedure, since it has to compute complex operations instead of a comparison operation such as the 'if' statement for detecting faults.…”
Section: Fault Propagationmentioning
confidence: 99%
“…For example, the Giraud method (Giraud, 2005(Giraud, , 2006 uses the Montgomery powering ladder (Joye and Yen, 2002) to evaluate m k mod p (or q), where k = d p (or d q Similarly, the Boscher et al method (Boscher et al, 2007) uses the right-to-left algorithm and returns the three tuples Recently, Ebeid and Lambert introduced a powerful fault attack which sets or resets a bit of the exponent k (Ebeid and Lambert, 2010). For example, let us suppose an attacker reset the i th bit of the secret exponent by zero.…”
Section: Resetting Data Fault Attackmentioning
confidence: 99%
See 2 more Smart Citations