Distinguishing Multiplications from Squaring Operations
From MaRDI portal
Publication:3644212
DOI10.1007/978-3-642-04159-4_22zbMath1256.94038OpenAlexW1579766512MaRDI QIDQ3644212
Frederic Amiel, William Marnane, Claire Whelan, Benoit Feix, Michael Tunstall
Publication date: 3 November 2009
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04159-4_22
RSAdifferential power analysisside channel attacksmodular multiplication and exponentiationsquare and multiply algorithm
Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Curves over finite and local fields (11G20)
Related Items (4)
The distributions of individual bits in the output of multiplicative operations ⋮ Random Order m-ary Exponentiation ⋮ Exponent Recoding and Regular Exponentiation Algorithms ⋮ Square Always Exponentiation
Cites Work
- Computing the distribution of the product of two continuous random variables
- Modular Multiplication Without Trial Division
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Power Attack on Small RSA Public Exponent
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- The Doubling Attack – Why Upwards Is Better than Downwards
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
- Advances in Elliptic Curve Cryptography
- Progress in Cryptology – Mycrypt 2005
- Selected Areas in Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Distinguishing Multiplications from Squaring Operations