Mostrar el registro sencillo del ítem

hal.structure.identifierDMI
dc.contributor.authorCLAVIER, Christophe
hal.structure.identifierInside Contactless
dc.contributor.authorFEIX, Benoit
hal.structure.identifierDMI
hal.structure.identifierInside Contactless
dc.contributor.authorGAGNEROT, Georges
hal.structure.identifierInside Contactless
dc.contributor.authorROUSSELLET, Mylène
hal.structure.identifierInside Contactless
hal.structure.identifierLithe and fast algorithmic number theory [LFANT]
hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
dc.contributor.authorVERNEUIL, Vincent
dc.contributor.editorJuan Hernández-Serrano
dc.date.accessioned2024-04-04T02:28:06Z
dc.date.available2024-04-04T02:28:06Z
dc.date.created2010
dc.date.issued2010-12
dc.date.conference2010-12-15
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/190070
dc.description.abstractEnWe introduce in this paper a technique in which we apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip. As in the Big Mac attack from Walter, longer keys may facilitate this analysis and success will depend on the arithmetic coprocessor characteristics. We present the theory of the attack with some practical successful results on an embedded device and analyze the efficiency of classical countermeasures with respect to our attack. Our technique, which uses a single exponentiation curve, cannot be prevented by exponent blinding. Also, contrarily to the Big Mac attack, it applies even in the case of regular implementations such as the square and multiply always or the Montgomery ladder. We also point out that DSA and Diffie-Hellman exponentiations are no longer immune against CPA. Then we discuss the efficiency of known countermeasures, and we finally present some new ones.
dc.language.isoen
dc.publisherSpringer
dc.rights.urihttp://hal.archives-ouvertes.fr/licences/copyright/
dc.title.enHorizontal Correlation Analysis on Exponentiation
dc.typeCommunication dans un congrès
dc.subject.halInformatique [cs]/Cryptographie et sécurité [cs.CR]
bordeaux.pagetbd
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.titleTwelfth International Conference on Information and Communications Security
bordeaux.countryES
bordeaux.conference.cityBarcelona
bordeaux.peerReviewedoui
hal.identifierinria-00540384
hal.version1
hal.invitednon
hal.proceedingsoui
hal.conference.organizerUniversitat Politècnica de Catalunya
hal.conference.end2010-12-17
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//inria-00540384v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2010-12&rft.spage=tbd&rft.epage=tbd&rft.au=CLAVIER,%20Christophe&FEIX,%20Benoit&GAGNEROT,%20Georges&ROUSSELLET,%20Myl%C3%A8ne&VERNEUIL,%20Vincent&rft.genre=unknown


Archivos en el ítem

ArchivosTamañoFormatoVer

No hay archivos asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem