High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA.
Arnaud VarillonLaurent SauvageJean-Luc DangerPublished in: SPACE (2023)
Keyphrases
- high order
- public key cryptosystems
- attack graphs
- countermeasures
- smart card
- attack graph
- modular exponentiation
- information security
- security vulnerabilities
- low end
- secret key
- attack scenarios
- elliptic curve cryptography
- higher order
- security risks
- elliptic curve
- digital signature
- digital watermark
- key distribution
- encryption scheme
- low order
- data corruption
- buffer overflow
- wireless sensor networks
- security issues
- authentication protocol
- pairwise
- dos attacks
- markov random field
- security mechanisms
- network security
- secure communication
- efficient implementation
- lower order
- ciphertext
- fpga implementation
- public key
- high end
- standard model
- signature scheme
- authentication scheme
- intrusion detection system
- encryption algorithm
- bayesian logistic regression
- public key cryptography
- security requirements
- rfid tags
- security properties
- image segmentation