메뉴 건너뛰기




Volumn 4249 LNCS, Issue , 2006, Pages 339-353

Power attack on small RSA public exponent

Author keywords

Exponent randomization; RSA cryptosystem; Simple power analysis; Sliding window methods

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; DATA TRANSFER; INFORMATION ANALYSIS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33750716484     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11894063_27     Document Type: Conference Paper
Times cited : (42)

References (10)
  • 1
    • 84947735905 scopus 로고    scopus 로고
    • An attack on RSA given a fraction of the private key bits
    • K. Ohta and D. Pei, editors, Advances in Cryptology Asiacrypt'98, Springer-Verlag
    • D. Boneh, G. Durfee, and Y. Frankel. An attack on RSA given a fraction of the private key bits. In K. Ohta and D. Pei, editors, Advances in Cryptology Asiacrypt'98, volume 1514 of LNCS, pages 25 - 34. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1514 , pp. 25-34
    • Boneh, D.1    Durfee, G.2    Frankel, Y.3
  • 2
    • 0000742754 scopus 로고
    • Addition chain heuristics
    • G. Brassard, editor, Advances in Cryptology - Crypto 1989, Springer Verlag
    • J. Bos and M. Coster, Addition Chain Heuristics. In G. Brassard, editor, Advances in Cryptology - Crypto 1989, volume 435 of LNCS, pages 400 - 407. Springer Verlag, 1989.
    • (1989) LNCS , vol.435 , pp. 400-407
    • Bos, J.1    Coster, M.2
  • 4
    • 0003683288 scopus 로고
    • Technical report, Tech Rep. 201, RSA Laboratories
    • C. K. Koç. High Speed RSA Implementation, Technical report, Tech Rep. 201, RSA Laboratories, 1994,
    • (1994) High Speed RSA Implementation
    • Koç, C.K.1
  • 5
    • 0029406556 scopus 로고
    • Analysis of sliding window technique for exponentiation
    • C. K. Koç, Analysis of Sliding Window Technique for Exponentiation. Computers and Mathematics with Applications, 10(30):17 - 24, 1995.
    • (1995) Computers and Mathematics with Applications , vol.10 , Issue.30 , pp. 17-24
    • Koç, C.K.1
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and others systems
    • N. Koblitz, editor, Advances in Cryptology - Crypto '96, Springer-Verlag
    • P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems. In N. Koblitz, editor, Advances in Cryptology - Crypto '96, volume 1109 of LNCS, pages 104 - 113. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 7
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks of modular exponentiation in smartcard
    • Ç. K. Koç and C. Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcard. In Ç. K. Koç and C. Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1717 of LNCS, pages 144 - 157. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 8
    • 0036003398 scopus 로고    scopus 로고
    • Some baby-step giant-step algorithms for the low hamming weight discrete logarithm problem
    • D. R. Stinson. Some Baby-Step Giant-Step Algorithms for the Low Hamming Weight Discrete Logarithm Problem. Mathematics of Computation, 71:379 - 391, 2002.
    • (2002) Mathematics of Computation , vol.71 , pp. 379-391
    • Stinson, D.R.1
  • 9
    • 84944888189 scopus 로고    scopus 로고
    • Sliding windows succumbs to big mac attack
    • Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
    • C. D. Walter. Sliding Windows Succumbs to Big Mac Attack. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of LNCS, pages 286 - 299. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 286-299
    • Walter, C.D.1
  • 10
    • 35048848043 scopus 로고    scopus 로고
    • Seeing through MIST given a small fraction of an RSA private key
    • M. Joye, editor, CT-RSA 2003, Springer-Verlag
    • C. D. Walter. Seeing through MIST Given a Small Fraction of an RSA Private Key. In M. Joye, editor, CT-RSA 2003, volume 2612 of LNCS, pages 391 - 402. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2612 , pp. 391-402
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.