메뉴 건너뛰기




Volumn 6, Issue 2, 2008, Pages 190-200

Countermeasures for hardware fault attack in multi-prime RSA cryptosystems

Author keywords

Chinese remainder theorem; Countermeasure; FPGA; Hardware fault attack; Immunity; RSA cryptosys tem

Indexed keywords

CHINESE REMAINDER THEOREM; COUNTERMEASURE; HARDWARE FAULTS; IMMUNITY; RSA CRYPTOSYS-TEM;

EID: 84874975376     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (35)
  • 4
    • 3042531980 scopus 로고    scopus 로고
    • A full RNS implementation of RSA
    • Jun
    • J. C. Bajard and l. Imbert, "A full RNS implementation of RSA," IEEE Transactions on Computers, vol. 53, no. 6, pp. 769-774, Jun. 2004.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 769-774
    • Bajard, J.C.1    Imbert, L.2
  • 6
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for fault
    • Springer-Verlag
    • D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the importance of checking cryptographic protocols for fault," in Eurocrypt'97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
    • (1997) Eurocrypt'97, LNCS 1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 9
    • 0030107358 scopus 로고    scopus 로고
    • Network security under siege: The timing attack
    • E. English and S. Hamilton, "Network security under siege: The timing attack," IEEE Transaction Com-puter, vol. 29, pp. 95-97, 1996.
    • (1996) IEEE Transaction Com-puter , vol.29 , pp. 95-97
    • English, E.1    Hamilton, S.2
  • 11
    • 0034428671 scopus 로고    scopus 로고
    • FPGA implementation of RSA public-key cryptographic coprocessor
    • Sep
    • M. K. Hani, T. S. Lin, and S. H. Nasir, "FPGA implementation of RSA public-key cryptographic coprocessor," in Proceedings on TENCON'00, vol. 3, pp. 6-11, Sep. 2000.
    • (2000) Proceedings on TENCON'00 , vol.3 , pp. 6-11
    • Hani, M.K.1    Lin, T.S.2    Nasir, S.H.3
  • 12
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering based cryptosystems in the presence of faults
    • M. Joye, A. K. Lenstra, and J.-J. Quisquater, "Chinese remaindering based cryptosystems in the presence of faults," Journal of Cryptology, vol. 12, no. 4, pp. 241-245, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems
    • Springer-Verlag
    • P. Kocher, "Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems," in Pro-ceedings of Crypto'96, pp. 104-113, Springer-Verlag, 1996.
    • (1996) Pro-ceedings of Crypto'96 , pp. 104-113
    • Kocher, P.1
  • 15
  • 16
    • 0003421346 scopus 로고
    • Technical notes TR 801, RSA Security Inc., Aug
    • C. K. Koc, RSA hardware implementation, Technical notes TR 801, RSA Security Inc., Aug. 1995.
    • (1995) RSA hardware implementation
    • Koc, C.K.1
  • 17
    • 0028482946 scopus 로고
    • A systolic, linear-array multiplier for a class of right-shift algorithms
    • Aug
    • P. Kornerup, "A systolic, linear-array multiplier for a class of right-shift algorithms," IEEE Transactions on Computer Arithmetic, vol. 43, pp. 892-898, Aug. 1994.
    • (1994) IEEE Transactions on Computer Arithmetic , vol.43 , pp. 892-898
    • Kornerup, P.1
  • 21
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • P. L. Montgomery, "Modular multiplication without trial division," Mathematics of Computation, vol. 44, pp. 519-521, 1985.
    • (1985) Mathematics of Computation , vol.44 , pp. 519-521
    • Montgomery, P.L.1
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 23
    • 84874975702 scopus 로고    scopus 로고
    • RSA Laboratories, PKCS 1 v2.0 Amend-ment 1: Multi-Prime RSA, Jul
    • RSA Laboratories, PKCS #1 v2.0 Amend-ment 1: Multi-Prime RSA, Jul. 2000. (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-0a1.pdf)
    • (2000)
  • 25
    • 47949098691 scopus 로고    scopus 로고
    • How to check modular exponentiation
    • May
    • A. Shamir, "How to check modular exponentiation," in Proceedings of Eurocrypt'97, pp. 123, May 1997.
    • (1997) Proceedings of Eurocrypt'97 , pp. 123
    • Shamir, A.1
  • 28
    • 84949759949 scopus 로고    scopus 로고
    • RSA cryptosystem design based on the chinese remainder theorem
    • C. H. Wu, J. H. Hong, and C. W. Wu, "RSA cryptosystem design based on the chinese remainder theorem," in Proceedings of the ASP-DAC'01, pp. 391-95, 2001.
    • (2001) Proceedings of the ASP-DAC'01 , pp. 391-395
    • Wu, C.H.1    Hong, J.H.2    Wu, C.W.3
  • 29
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • Sep
    • S. M. Yen and M. Joye, "Checking before output may not be enough against fault-based cryptanalysis," IEEE Transactions on Computers, vol.49, no. 9, pp. 967-970, Sep. 2000.
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.M.1    Joye, M.2
  • 33
    • 0038374937 scopus 로고    scopus 로고
    • RSA Speedup with chinese remainder theorem immune against hardware fault cryptanalysis
    • Apr
    • S. M. Yen, S. Kim, S. Lim, and S. J. Moon, "RSA Speedup with chinese remainder theorem immune against hardware fault cryptanalysis," IEEE Trans-actions on computers, vol. 52, pp. 461-472, Apr. 2003.
    • (2003) IEEE Trans-actions on computers , vol.52 , pp. 461-472
    • Yen, S.M.1    Kim, S.2    Lim, S.3    Moon, S.J.4
  • 34
    • 35248846556 scopus 로고    scopus 로고
    • Hardware fault attack on RSA with CRT Revisited
    • Springer-Verlag
    • S. M. Yen, S. J. Moon, and J. C. Ha, "Hardware fault attack on RSA with CRT Revisited," in Proceedings of the ICISC'02, LNCS 2587, pp. 374-388, Springer-Verlag, 2003.
    • (2003) Proceedings of the ICISC'02, LNCS 2587 , pp. 374-388
    • Yen, S.M.1    Moon, S.J.2    Ha, J.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.