Sciweavers

28 search results - page 1 / 6
» Power Analysis Attacks of Modular Exponentiation in Smartcar...
Sort
View
89
Voted
CHES
1999
Springer
140views Cryptology» more  CHES 1999»
15 years 1 months ago
Power Analysis Attacks of Modular Exponentiation in Smartcards
Abstract. Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to ...
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
14 years 11 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
74
Voted
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 2 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
TC
2002
14 years 9 months ago
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
94
Voted
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
15 years 1 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges