The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Este artigo propõe um novo ataque de canal lateral à criptografia RSA. Nosso objetivo é uma implementação com uma combinação de contramedidas. Estas são uma contramedida de SPA da m-ary método e uma contramedida DPA por meio de técnicas de expoente aleatório. Aqui, as técnicas de randomização do expoente mostram duas contramedidas DPA para randomizar o expoente secreto d. Uma delas é uma técnica de randomização de expoente usando d'i = d+ riφ(N) calcular cd'i (modo N), e outra é uma técnica que usa di,1 =
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Kouichi ITOH, Dai YAMAMOTO, Jun YAJIMA, Wakaha OGATA, "Collision-Based Power Attack for RSA with Small Public Exponent" in IEICE TRANSACTIONS on Information,
vol. E92-D, no. 5, pp. 897-908, May 2009, doi: 10.1587/transinf.E92.D.897.
Abstract: This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 =
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E92.D.897/_p
Copiar
@ARTICLE{e92-d_5_897,
author={Kouichi ITOH, Dai YAMAMOTO, Jun YAJIMA, Wakaha OGATA, },
journal={IEICE TRANSACTIONS on Information},
title={Collision-Based Power Attack for RSA with Small Public Exponent},
year={2009},
volume={E92-D},
number={5},
pages={897-908},
abstract={This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 =
keywords={},
doi={10.1587/transinf.E92.D.897},
ISSN={1745-1361},
month={May},}
Copiar
TY - JOUR
TI - Collision-Based Power Attack for RSA with Small Public Exponent
T2 - IEICE TRANSACTIONS on Information
SP - 897
EP - 908
AU - Kouichi ITOH
AU - Dai YAMAMOTO
AU - Jun YAJIMA
AU - Wakaha OGATA
PY - 2009
DO - 10.1587/transinf.E92.D.897
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E92-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2009
AB - This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 =
ER -