Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA.
Werner SchindlerPublished in: CHES (2015)
Keyphrases
- cryptographic algorithms
- countermeasures
- sql injection
- traffic analysis
- watermarking scheme
- terrorist attacks
- security protocols
- attack detection
- malicious attacks
- elliptic curve cryptography
- malicious users
- power analysis
- key exchange
- security mechanisms
- public key cryptography
- power law
- signature scheme
- watermarking algorithm
- smart card
- chosen plaintext
- modular exponentiation
- asynchronous circuits
- public key
- information security