2012
DOI: 10.1007/978-3-642-33027-8_27
|View full text |Cite
|
Sign up to set email alerts
|

Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA

Abstract: Abstract. We (re-) introduce the Reduce-By-Feedback scheme given by Vielhaber (1987), Benaloh andDai (1995), andJeong andBurleson (1997).We show, how to break RSA, when implemented with the standard version of Reduce-by-Feedback or Montgomery multiplication, by Differential Power Analysis. We then modify Reduce-by-Feedback to avoid this attack. The modification is not possible for Montgomery multiplication.We show that both the original and the modified Reduce-by-Feedback algorithm resist timing attacks.Furthe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…If implementing in software, skip directly to Theorem 24. An alternative implementation of division in Q and thus FQSRs, by Reduce-By-Feedback (see [21]), is shown in Table 13, right hand side.…”
Section: Remark 22mentioning
confidence: 99%
See 1 more Smart Citation
“…If implementing in software, skip directly to Theorem 24. An alternative implementation of division in Q and thus FQSRs, by Reduce-By-Feedback (see [21]), is shown in Table 13, right hand side.…”
Section: Remark 22mentioning
confidence: 99%
“…More on the implementation of FQSRs in hardware can be found in [21], including the use of Brickell's delayed-carry-adder technique: Paper-and-pencil long division is a subset of RSA via modular exponentiation ⊇ multiplication mod Q ⊇ shift-and-add mod Q ⊇ shift (no add) mod Q = long division.…”
Section: Theorem 24 Fast Reinitialisation Of Fqsrsmentioning
confidence: 99%