Flexible Exponentiation with Resistance to Side Channel Attacks [chapter]

Camille Vuillaume, Katsuyuki Okeya
2006 Lecture Notes in Computer Science  
We present a countermeasure for protecting modular exponentiations against side-channel attacks such as power, timing or cache analysis. Our countermeasure is well-suited for tamper-resistant implementations of RSA or DSA, without significant penalty in terms of speed compared to commonly implemented methods. Thanks to its high efficiency and flexibility, our method can be implemented on various platforms, from smartcards with low-end processors to high-performance servers.
doi:10.1007/11767480_18 fatcat:bmacuz4dyrhndpl6g4infbcnuy