The Carry Leakage on the Randomized Exponent Countermeasure
نویسندگان
چکیده
منابع مشابه
Public Key Perturbation of Randomized RSA Implementations
Among all countermeasures that have been proposed to thwart side-channel attacks against RSA implementations, the exponent randomization method – also known as exponent blinding – has been very early suggested by P. Kocher in 1996, and formalized by J.-S. Coron at CHES 1999. Although it has been used for a long time, some authors pointed out the fact that it does not intrinsically remove all so...
متن کاملMasking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show that this countermeasure prevents side-channel attacks of all orders during the execution of a protected block cipher implementation, given that some secure precomputations can be performed. Second, we show that taking...
متن کاملEffects of Flow Hydraulics, Pipe Structure and Submerged Jet on Leak Behaviour
The aim of this paper is numerical and experimental study of the effects of flow hydraulics, pipe structure (particularly elastic behaviour) and submerged jet on leak behaviour. In this regard, experimental tests were performed on a high-pressure circulation set up. Experiments were performed on an old steel pipe and a High Density Polyethylene (HDPE) pipe discharged to the atmosphere in a wide...
متن کاملImprovement on Ha-Moon Randomized Exponentiation Algorithm
Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. However, this category of countermeasures can only be applicable to those cryptosystems with fixed parameters on the base integer when evaluating exponentiation or to some classes of cryptosystems such that the inversion ...
متن کاملFrom New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security
Ferroelectric RAM (FRAM) is a promising non-volatile memory technology that is now available in low-end microcontrollers. Its main advantages over Flash memories are faster write performances and much larger tolerated number of write/erase cycles. These properties are profitable for the efficient implementation of side-channel countermeasures exploiting pre-computations. In this paper, we illus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008