Exponent splitting is a classical technique to protect modular exponentiation against side-channel attacks. Although it is rarely implemented due to efficiency reasons, it is widely considered as a highlysecure solution. Therefore it is often used as a reference to benchmark new countermeasure proposals. In this paper, we make new observations about the statistical behavior of the splitting of the exponent. We look at the correlations between the two shares, and show an important imbalance. Later, we show how to use this imbalance in higher-order attacks (mostly based on address-bit, safe-error and fault analysis). We also present experimental results to estimate their feasibility. © International Association for Cryptologic Research 2006.
CITATION STYLE
Muller, F., & Valette, F. (2006). High-order attacks against the exponent splitting protection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3958 LNCS, pp. 315–329). https://doi.org/10.1007/11745853_21
Mendeley helps you to discover research relevant for your work.