On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance
From MaRDI portal
Publication:2794567
DOI10.1007/978-3-319-10175-0_5zbMath1440.94053OpenAlexW350712552MaRDI QIDQ2794567
Publication date: 10 March 2016
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-10175-0_5
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fault analysis in cryptography. Foreword by Dan Boneh
- ROSETTA for Single Trace Analysis
- Horizontal Correlation Analysis on Exponentiation
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
- A method for obtaining digital signatures and public-key cryptosystems
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- Combined Attack on CRT-RSA
- Power Analysis Attacks
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
This page was built for publication: On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance