2021 IEEE 39th VLSI Test Symposium (VTS) 2021
DOI: 10.1109/vts50974.2021.9441035
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Bit Blinding: A Countermeasure for RSA Against Side Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…In the 4bit sliding window method, the same computations (four squarings and one multiplication) are performed in every step of the exponentiation operation, regardless of the values of the exponent bits, to ensure indistinguishable power profiles. A similar approach that uses the 2-bit sliding window, as well as secret key blinding, is applied in [56]. Note that, in our work, we utilize all the mentioned side-channel attack countermeasures, namely the sliding window method (with the 4-bit window size), secret key blinding and ciphertext blinding.…”
Section: B Side-channel Attack Countermeasuresmentioning
confidence: 99%
“…In the 4bit sliding window method, the same computations (four squarings and one multiplication) are performed in every step of the exponentiation operation, regardless of the values of the exponent bits, to ensure indistinguishable power profiles. A similar approach that uses the 2-bit sliding window, as well as secret key blinding, is applied in [56]. Note that, in our work, we utilize all the mentioned side-channel attack countermeasures, namely the sliding window method (with the 4-bit window size), secret key blinding and ciphertext blinding.…”
Section: B Side-channel Attack Countermeasuresmentioning
confidence: 99%