A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Enhanced power analysis attack using chosen message against RSA hardware implementations
2008
2008 IEEE International Symposium on Circuits and Systems
SPA (Simple Power Analysis) attacks against RSA cryptosystems are enhanced by using chosen-message scenarios. One of the most powerful chosen-message SPA attacks was proposed by Yen et. al. in 2005, which can be applied to various algorithms and architectures, and can defeat the most popular SPA countermeasure using dummy multiplication. The special input values of −1 and a pair of −X and X can be used to identify squaring operations performed depending on key bit stream. However, no
doi:10.1109/iscas.2008.4542159
dblp:conf/iscas/MiyamotoHAS08
fatcat:3bqzarztlbdgrpjs4phecwkqou