2014 International Computer Science and Engineering Conference (ICSEC) 2014
DOI: 10.1109/icsec.2014.6978216
|View full text |Cite
|
Sign up to set email alerts
|

A new style CPA attack on the ML implementation of RSA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…RSA was also implemented using the Montgomery power ladder (ML) multiplication [16, 17]. With RSA implemented in ML, two multiplications remained independent and two shared the same operand.…”
Section: Rsa Cryptosystemmentioning
confidence: 99%
See 3 more Smart Citations
“…RSA was also implemented using the Montgomery power ladder (ML) multiplication [16, 17]. With RSA implemented in ML, two multiplications remained independent and two shared the same operand.…”
Section: Rsa Cryptosystemmentioning
confidence: 99%
“…The works of Kuzu et al . [16, 17] and Jia and Xie [18] showed how easily they could discover the mode of RSA implementation as well as decryption key from fewer traces using CPA.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations