메뉴 건너뛰기




Volumn 232, Issue , 2013, Pages 464-474

Improving timing attack on RSA-CRT via error detection and correction strategy

Author keywords

Error detection; Public key cryptography; RSA; Side channel attacks; t Test; Timing attack

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; ERROR DETECTION AND CORRECTION; ERROR-DETECTION MECHANISM; NEIGHBORHOOD SIZE; RSA; SIDE CHANNEL ATTACK; T-TEST; TIMING ATTACKS;

EID: 84875455431     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2012.01.027     Document Type: Article
Times cited : (26)

References (23)
  • 4
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • D. Brumley, and D. Boneh Remote timing attacks are practical Computer Networks 48 5 2005 701 716
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 6
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations and low exponent RSA vulnerabilities
    • D. Coppersmith Small solutions to polynomial equations and low exponent RSA vulnerabilities Journal of Cryptology 10 4 1997 233 260
    • (1997) Journal of Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 7
    • 1342285565 scopus 로고    scopus 로고
    • Cryptanalysis of short secret exponents modulo RSA primes
    • C.Y. Chen, C.Y. Ku, and D.C. Yen Cryptanalysis of short secret exponents modulo RSA primes Information Sciences 160 4 2004 225 233
    • (2004) Information Sciences , vol.160 , Issue.4 , pp. 225-233
    • Chen, C.Y.1    Ku, C.Y.2    Yen, D.C.3
  • 9
    • 0242521606 scopus 로고    scopus 로고
    • Intel Technical Report, Intel Corporation
    • Intel, Using the RDTSC Instruction for Performance Monitoring, Technical Report, Intel Corporation, 1997. < http://www.ccsl.carletin.ca/∼jamuir/ rdtscpm1.pdf >.
    • (1997) Using the RDTSC Instruction for Performance Monitoring
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • P. Kocher, Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems, in: Advances in Cryptology-CRYPTO'96, LNCS, vol. 1109, 1996, pp. 104-113.
    • (1996) Advances in Cryptology-CRYPTO'96, LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 12
    • 47849097207 scopus 로고    scopus 로고
    • Differential fault analysis on the ARIA algorithm
    • W. Li, D. W Gu, and J. R Li Differential fault analysis on the ARIA algorithm Information Sciences 178 19 2008 3727 3737
    • (2008) Information Sciences , vol.178 , Issue.19 , pp. 3727-3737
    • Li, W.1    Gu D, W.2    Li J, R.3
  • 13
    • 33845422157 scopus 로고    scopus 로고
    • Side-channel attacks on smartcards
    • A. Matthews Side-channel attacks on smartcards Network Security 12 2006 18 20
    • (2006) Network Security , Issue.12 , pp. 18-20
    • Matthews, A.1
  • 15
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • P.L. Montgomery Modular multiplication without trial division Mathematics of Computation 44 170 1985 519 521
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 18
    • 33747196393 scopus 로고    scopus 로고
    • The complexity of DPA type side channel attacks and their dependency on the algorithm design
    • J. Ruedinger The complexity of DPA type side channel attacks and their dependency on the algorithm design Information Security Technical Report 11 3 2006 154 158
    • (2006) Information Security Technical Report , vol.11 , Issue.3 , pp. 154-158
    • Ruedinger, J.1
  • 22
    • 56949089563 scopus 로고    scopus 로고
    • An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation
    • C.L. Wu An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation Information Sciences 179 4 2009 410 421
    • (2009) Information Sciences , vol.179 , Issue.4 , pp. 410-421
    • Wu, C.L.1
  • 23
    • 33847655248 scopus 로고    scopus 로고
    • Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
    • N. Zhang, Z.X. Chen, and G.Z. Xiao Efficient elliptic curve scalar multiplication algorithms resistant to power analysis Information Sciences 177 10 2007 2119 2129
    • (2007) Information Sciences , vol.177 , Issue.10 , pp. 2119-2129
    • Zhang, N.1    Chen, Z.X.2    Xiao, G.Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.