Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable
Alexandre BerzatiCécile CanovasJean-Guillaume DumasLouis GoubinPublished in: CoRR (2009)
Keyphrases
- security risks
- fault diagnosis
- countermeasures
- private key
- fault injection
- cryptographic algorithms
- fault detection
- public key
- efficient implementation
- traffic analysis
- secret key
- power analysis
- neural network
- network security
- public space
- elliptic curve cryptography
- elliptic curve
- failure modes
- cryptographic protocols
- cyber attacks
- security mechanisms
- watermarking scheme
- hash functions
- expert systems