Combined Attack on CRT-RSA
From MaRDI portal
Publication:4916010
DOI10.1007/978-3-642-36362-7_13zbMath1314.94055OpenAlexW2231987179MaRDI QIDQ4916010
Alberto Battistello, Soline Renner, Christophe Giraud, Guénaël Renault, Guillaume Dabosville, Rina Zeitoun, Guillaume Barbu
Publication date: 19 April 2013
Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_13
Related Items (3)
Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks ⋮ All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks ⋮ On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance
Cites Work
- Fault analysis in cryptography. Foreword by Dan Boneh
- The Magma algebra system. I: The user language
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- Finding a Small Root of a Univariate Modular Equation
- Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
- Defeating RSA Multiply-Always and Message Blinding Countermeasures
- Square Always Exponentiation
- To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Differential Behavioral Analysis
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
- Fault Attacks on RSA Signatures with Partially Unknown Messages
- A method for obtaining digital signatures and public-key cryptosystems
- Fault Attacks Against emv Signatures
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Combined Attack on CRT-RSA