2013 18th International Conference on Digital Signal Processing (DSP) 2013
DOI: 10.1109/icdsp.2013.6622717
|View full text |Cite
|
Sign up to set email alerts
|

All bits cross correlation attack on the Montgomery Ladder implementation of RSA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…The powers g i (mod n) (i=1,2,…,2 m-1 ) can be pre-computed and used in the multipli-in [15] , where techniques to strengthen cross correlation attack by averaging correlation values and comparing to a threshold were described. The CCAs against Montgomery ladder implementation of the RSA algorithm were analyzed in [16][17][18], and the voting mechanism and novel one or multi reference bits approaches were proposed.…”
Section: The Binary Modular Exponentiation Algorithmsmentioning
confidence: 99%
See 4 more Smart Citations
“…The powers g i (mod n) (i=1,2,…,2 m-1 ) can be pre-computed and used in the multipli-in [15] , where techniques to strengthen cross correlation attack by averaging correlation values and comparing to a threshold were described. The CCAs against Montgomery ladder implementation of the RSA algorithm were analyzed in [16][17][18], and the voting mechanism and novel one or multi reference bits approaches were proposed.…”
Section: The Binary Modular Exponentiation Algorithmsmentioning
confidence: 99%
“…The typical CCAs are useful for the message blinding countermeasures [13][14][15][16][17][18]. The basic idea of CCA algorithms are that the operations would be trivially independent if two operations have no operand in common.…”
Section: Cross Correlation Attacks On Message Blinding Exponentiationmentioning
confidence: 99%
See 3 more Smart Citations