Show simple item record

hal.structure.identifierDMI
dc.contributor.authorCLAVIER, Christophe
hal.structure.identifierDMI
dc.contributor.authorFEIX, Benoit
hal.structure.identifierDMI
dc.contributor.authorGAGNEROT, Georges
hal.structure.identifierInside Secure
dc.contributor.authorROUSSELLET, Mylène
hal.structure.identifierInside Secure
hal.structure.identifierLithe and fast algorithmic number theory [LFANT]
hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
dc.contributor.authorVERNEUIL, Vincent
dc.date.accessioned2024-04-04T02:26:33Z
dc.date.available2024-04-04T02:26:33Z
dc.date.issued2011-12
dc.date.conference2011-12-11
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/189957
dc.description.abstractEnEmbedded exponentiation techniques have become a key concern for security and efficiency in hardware devices using public key cryptography. An exponentiation is basically a sequence of multiplications and squarings, but this sequence may reveal exponent bits to an attacker on an unprotected implementation. Although this subject has been covered for years, we present in this paper new exponentiation algorithms based on trading multiplications for squarings. Our method circumvents attacks aimed at distinguishing squarings from multiplications at a lower cost than previous techniques. Last but not least, we present new algorithms using two parallel squaring blocks which provide the fastest exponentiation to our knowledge.
dc.language.isoen
dc.publisherSpringer
dc.subject.enPublic key cryptography
dc.subject.enexponentiation
dc.subject.enlong integer arithmetic
dc.subject.enside-channel analysis
dc.subject.enatomicity
dc.title.enSquare Always Exponentiation
dc.typeCommunication dans un congrès
dc.identifier.doi10.1007/978-3-642-25578-6_5
dc.subject.halInformatique [cs]/Cryptographie et sécurité [cs.CR]
bordeaux.page40-57
bordeaux.volume7107
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.title12th International Conference on Cryptology in India - INDOCRYPT 2011
bordeaux.countryIN
bordeaux.conference.cityChennai
bordeaux.peerReviewedoui
hal.identifierinria-00633545
hal.version1
hal.invitednon
hal.proceedingsoui
hal.conference.end2011-12-14
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//inria-00633545v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2011-12&rft.volume=7107&rft.spage=40-57&rft.epage=40-57&rft.au=CLAVIER,%20Christophe&FEIX,%20Benoit&GAGNEROT,%20Georges&ROUSSELLET,%20Myl%C3%A8ne&VERNEUIL,%20Vincent&rft.genre=unknown


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record