Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
暂无分享,去创建一个
Adi Shamir | Akashi Satoh | Takafumi Aoki | Naofumi Homma | Atsushi Miyamoto | A. Shamir | A. Satoh | T. Aoki | N. Homma | A. Miyamoto | Akashi Satoh
[1] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[2] Roman Novak,et al. SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation , 2002, Public Key Cryptography.
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] Akashi Satoh,et al. High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching , 2006, CHES.
[5] JaeCheol Ha,et al. Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption , 2005, Mycrypt.
[6] Bert den Boer,et al. A DPA Attack against the Modular Reduction within a CRT Implementation of RSA , 2002, CHES.
[7] Frédéric Valette,et al. The Doubling Attack - Why Upwards Is Better than Downwards , 2003, CHES.
[8] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[9] Aggelos Kiayias,et al. Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers , 2005, Mycrypt.
[10] Werner Schindler,et al. A Timing Attack against RSA with the Chinese Remainder Theorem , 2000, CHES.
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[13] Kouichi Itoh,et al. DPA Countermeasures by Improving the Window Method , 2002, CHES.
[14] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2003 , 2003, Lecture Notes in Computer Science.
[15] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[16] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[17] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.
[18] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[19] C. D. Walter,et al. MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis , 2002, CT-RSA.
[20] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[21] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[22] C. D. Walter,et al. Distinguishing Exponent Digits by Observing Modular Subtractions , 2001, CT-RSA.
[23] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[24] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - Ches 2007 , 2008 .
[25] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[26] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[27] Marc Joye,et al. Highly Regular Right-to-Left Algorithms for Scalar Multiplication , 2007, CHES.
[28] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[29] Bart Preneel,et al. Topics in Cryptology — CT-RSA 2002 , 2002, Lecture Notes in Computer Science.