Power analysis and countermeasure of RSA cryptosystem
暂无分享,去创建一个
[1] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[2] Christophe Clavier,et al. Universal Exponentiation Algorithm , 2001, CHES.
[3] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[4] C. D. Walter,et al. Distinguishing Exponent Digits by Observing Modular Subtractions , 2001, CT-RSA.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[7] Werner Schindler,et al. A Timing Attack against RSA with the Chinese Remainder Theorem , 2000, CHES.
[8] Dan Boneh,et al. An Attack on RSA Given a Small Fraction of the Private Key Bits , 1998, ASIACRYPT.
[9] C. D. Walter,et al. MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis , 2002, CT-RSA.
[10] Peter K. Pearson,et al. IPA: A New Class of Power Attacks , 1999, CHES.
[11] Wieland Fischer,et al. Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures , 2002, CHES.
[12] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.
[13] Bruce Schneier,et al. Side channel cryptanalysis of product ciphers , 2000 .
[14] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[15] C. D. Walter,et al. Sliding Windows Succumbs to Big Mac Attack , 2001, CHES.
[16] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[17] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[18] C. D. Walter,et al. Some Security Aspects of the M IST Randomized Exponentiation Algorithm , 2002, CHES.