메뉴 건너뛰기




Volumn 2274, Issue , 2002, Pages 263-279

A combined timing and power attack

Author keywords

Mon tgomery s algorithm; P ower attack; Timing attack

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 84958960266     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45664-3_19     Document Type: Conference Paper
Times cited : (48)

References (9)
  • 2
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS and Other Systems
    • N. Koblitz (ed.), Lecture Notes in Computer Science 1109. Springer,Heidelb erg
    • P. Kocher: Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS and Other Systems. In: N. Koblitz (ed.): Advances in Cryptology – Crypto’96,Lecture Notes in Computer Science 1109. Springer,Heidelb erg (1996),104–113.
    • (1996) Advances in Cryptology – Crypto’96 , pp. 104-113
    • Kocher, P.1
  • 3
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • Ç.K. Koç,D. Naccache,C. Paar (eds.), Springer,Lecture Notes in Computer Science 2162,Berlin
    • K. Gandolfi, C. Mourtel, F. Olivier: Electromagnetic Analysis: Concrete Results. In: Ç.K. Koç,D. Naccache,C. Paar (eds.): Cryptographic Hardware and Embedded Systems — CHES 2001,Springer,Lecture Notes in Computer Science 2162,Berlin (2001),251–261.
    • (2001) Cryptographic Hardware and Embedded Systems — CHES 2001 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 6
    • 84966243285 scopus 로고
    • Modular Multiplication without Trial Division
    • P.L. Montgomery: Modular Multiplication without Trial Division, Math. Comp. 44,no. 170,519–521 (April 1985).
    • (1985) Math. Comp , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 8
    • 85099426899 scopus 로고    scopus 로고
    • A Timing Attack against RSA with the Chinese Remainder Theorem
    • Ç.K. Koç,C. Paar (eds.), Springer,Lecture Notes in Computer Science 1965,Berlin
    • W. Schindler: A Timing Attack against RSA with the Chinese Remainder Theorem. In: Ç.K. Koç,C. Paar (eds.): Cryptographic Hardware and Embedded Systems — CHES 2000,Springer,Lecture Notes in Computer Science 1965,Berlin (2000),110–125.
    • (2000) Cryptographic Hardware and Embedded Systems — CHES 2000 , pp. 110-125
    • Schindler, W.1
  • 9
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing Exponent Digits by Observing Modular Subtractions
    • D. Naccache (ed.), Springer,Lecture Notes in Computer Science 2020,Berlin
    • C.D. Walter, S. Thompson: Distinguishing Exponent Digits by Observing Modular Subtractions. In: D. Naccache (ed.): Topics in Cryptology – CT-RSA 2001, Springer,Lecture Notes in Computer Science 2020,Berlin (2000),192–207.
    • (2000) Topics in Cryptology – CT-RSA 2001 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.