Exponent Blinding May Not Prevent Timing Attacks on RSA.
Werner SchindlerPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- cryptographic algorithms
- countermeasures
- sql injection
- watermarking scheme
- security threats
- public key
- power law
- security protocols
- power analysis
- signature scheme
- traffic analysis
- security risks
- secret information
- elliptic curve cryptography
- watermarking algorithm
- elliptic curve
- dos attacks
- malicious attacks
- anomaly detection
- digital signature scheme