2013 3rd IEEE International Advance Computing Conference (IACC) 2013
DOI: 10.1109/iadcc.2013.6514209
|View full text |Cite
|
Sign up to set email alerts
|

New cross correlation attack methods on the Montgomery Ladder implementation of RSA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…The powers g i (mod n) (i=1,2,…,2 m-1 ) can be pre-computed and used in the multipli-in [15] , where techniques to strengthen cross correlation attack by averaging correlation values and comparing to a threshold were described. The CCAs against Montgomery ladder implementation of the RSA algorithm were analyzed in [16][17][18], and the voting mechanism and novel one or multi reference bits approaches were proposed.…”
Section: The Binary Modular Exponentiation Algorithmsmentioning
confidence: 99%
See 4 more Smart Citations
“…The powers g i (mod n) (i=1,2,…,2 m-1 ) can be pre-computed and used in the multipli-in [15] , where techniques to strengthen cross correlation attack by averaging correlation values and comparing to a threshold were described. The CCAs against Montgomery ladder implementation of the RSA algorithm were analyzed in [16][17][18], and the voting mechanism and novel one or multi reference bits approaches were proposed.…”
Section: The Binary Modular Exponentiation Algorithmsmentioning
confidence: 99%
“…The typical CCAs are useful for the message blinding countermeasures [13][14][15][16][17][18]. The basic idea of CCA algorithms are that the operations would be trivially independent if two operations have no operand in common.…”
Section: Cross Correlation Attacks On Message Blinding Exponentiationmentioning
confidence: 99%
See 3 more Smart Citations