2018
DOI: 10.1049/iet-ifs.2016.0508
|View full text |Cite
|
Sign up to set email alerts
|

Securing RSA against power analysis attacks through non‐uniform exponent partitioning with randomisation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Finally, we hope that our work will be followed by some interesting further research works. Among them, experiments should be performed on protected implementation and on different machine architectures [27][28][29][30][31]. The principal component analysis (PCA) could also be used to enhance our strategies [32].…”
Section: Resultsmentioning
confidence: 99%
“…Finally, we hope that our work will be followed by some interesting further research works. Among them, experiments should be performed on protected implementation and on different machine architectures [27][28][29][30][31]. The principal component analysis (PCA) could also be used to enhance our strategies [32].…”
Section: Resultsmentioning
confidence: 99%
“…To prevent these attacks, hardware protections and software countermeasures have been published, and the exponent and message blinding methods are the main countermeasures. In the exponent blinding method [20][21][22], the exponent is randomized or split, and consequently, subsequent exponentiation operations handle different exponential data. For message blinding methods [23][24][25], the message is multiplied by a random value, and this blinded message is then used in exponentiation algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…The exponent blinding method and the message blinding method can also be regarded as effective countermeasures for modular exponentiation algorithms. There are generally two type exponent blinding countermeasures in present [20][21][22][23][24][25]. Ha et al [24] proposed a modular exponentiation protection method for double masking by using a random number r to blind the message and the exponent split.…”
Section: Exponent and Message Blinding Modular Exponentiation Algorithmmentioning
confidence: 99%