A New Simple Power Analysis Attack on the m-ary Exponentiation Implementation
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] JaeCheol Ha,et al. A Physical Combined Attack and its Countermeasure on BNP Exponentiation Algorithm , 2013, Inscrypt 2013.
[3] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[4] Marc Joye,et al. Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis , 2000, IEEE Trans. Computers.