Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
- Published: 01 Jan 2016
- Publisher: HAL CCSD
- Country: France
- Funder: European Commission (EC)
- Project Code: 609611
- Funding stream: FP7 | SP1 | ICT
- 1
- 2
1. Aumuller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Cryptographic Hardware and Embedded Systems, (CHES '02). pp. 260{275. Springer (2003)
2. Baek, Y.: Regular 2w -ary right-to-left exponentiation algorithm with very e cient DPA and FA countermeasures. Int. J. Inf. Sec. 9(5), 363{370 (2010)
3. Blomer, J., Gomes Da Silva, R., Gunther, P., Kramer, J., Seifert, J.P.: A practical second-order fault attack against a real-world pairing implementation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '14). pp. 123{136. IEEE (2014)
4. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Advances in Cryptology { EUROCRYPT 1997. pp. 37{51. Springer (1997) [OpenAIRE]
5. Boscher, A., Handschuh, H., Trichina, E.: Blinded fault resistant exponentiation revisited. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '09). pp. 3{9. IEEE (2009)
6. Boscher, A., Naciri, R., Prou , E.: CRT RSA algorithm protected against fault attacks. In: Information Security Theory and Practices. pp. 229{243. Springer (2007) [OpenAIRE]
7. Coron, J.: Resistance against di erential power analysis for elliptic curve cryptosystems. In: Cryptographic Hardware and Embedded Systems (CHES '99). pp. 292{302. Springer (1999) [OpenAIRE]
8. Fumaroli, G., Vigilant, D.: Blinded fault resistant exponentiation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '06). pp. 62{70. Springer (2006) [OpenAIRE]
9. Giraud, C.: An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans. Computers 55(9), 1116{1120 (2006)
10. Joye, M., Karroumi, M.: Memory-e cient fault countermeasures. In: Smart Card Research and Advanced Applications. pp. 84{101. Springer (2011) [OpenAIRE]
11. Joye, M., Lenstra, A.K., Quisquater, J.: Chinese remaindering based cryptosystems in the presence of faults. J. Cryptology 12(4), 241{245 (1999)
12. Joye, M., Paillier, P., Yen, S.M.: Secure evaluation of modular functions (2001)
13. Joye, M., Yen, S.: The Montgomery powering ladder. In: Cryptographic Hardware and Embedded Systems, CHES 2002. pp. 291{302. Springer (2003)
14. Kim, C.H., Quisquater, J.: How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: Fault Diagnosis and Tolerance in Cryptography (FDTC '07). pp. 21{29. IEEE (2007)
15. Kiss, A., Kramer, J., Rauzy, P., Seifert, J.P.: Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT. Cryptology ePrint Archive, Report 2016/238 (2016), http://eprint.iacr.org/2016/238
- 1
- 2
Related research
- Funder: European Commission (EC)
- Project Code: 609611
- Funding stream: FP7 | SP1 | ICT
- 1
- 2
1. Aumuller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Cryptographic Hardware and Embedded Systems, (CHES '02). pp. 260{275. Springer (2003)
2. Baek, Y.: Regular 2w -ary right-to-left exponentiation algorithm with very e cient DPA and FA countermeasures. Int. J. Inf. Sec. 9(5), 363{370 (2010)
3. Blomer, J., Gomes Da Silva, R., Gunther, P., Kramer, J., Seifert, J.P.: A practical second-order fault attack against a real-world pairing implementation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '14). pp. 123{136. IEEE (2014)
4. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Advances in Cryptology { EUROCRYPT 1997. pp. 37{51. Springer (1997) [OpenAIRE]
5. Boscher, A., Handschuh, H., Trichina, E.: Blinded fault resistant exponentiation revisited. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '09). pp. 3{9. IEEE (2009)
6. Boscher, A., Naciri, R., Prou , E.: CRT RSA algorithm protected against fault attacks. In: Information Security Theory and Practices. pp. 229{243. Springer (2007) [OpenAIRE]
7. Coron, J.: Resistance against di erential power analysis for elliptic curve cryptosystems. In: Cryptographic Hardware and Embedded Systems (CHES '99). pp. 292{302. Springer (1999) [OpenAIRE]
8. Fumaroli, G., Vigilant, D.: Blinded fault resistant exponentiation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '06). pp. 62{70. Springer (2006) [OpenAIRE]
9. Giraud, C.: An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans. Computers 55(9), 1116{1120 (2006)
10. Joye, M., Karroumi, M.: Memory-e cient fault countermeasures. In: Smart Card Research and Advanced Applications. pp. 84{101. Springer (2011) [OpenAIRE]
11. Joye, M., Lenstra, A.K., Quisquater, J.: Chinese remaindering based cryptosystems in the presence of faults. J. Cryptology 12(4), 241{245 (1999)
12. Joye, M., Paillier, P., Yen, S.M.: Secure evaluation of modular functions (2001)
13. Joye, M., Yen, S.: The Montgomery powering ladder. In: Cryptographic Hardware and Embedded Systems, CHES 2002. pp. 291{302. Springer (2003)
14. Kim, C.H., Quisquater, J.: How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: Fault Diagnosis and Tolerance in Cryptography (FDTC '07). pp. 21{29. IEEE (2007)
15. Kiss, A., Kramer, J., Rauzy, P., Seifert, J.P.: Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT. Cryptology ePrint Archive, Report 2016/238 (2016), http://eprint.iacr.org/2016/238
- 1
- 2