Power Analysis has been deeply studied since 1998 in order to improve the security of tamper resistant products such as Trusted Platform Module (TPM). The study has evolved from initial basic techniques like simple and differential power analysis to more complex models such as correlation. However, works on correlation techniques have essentially been focused on symmetric cryptography. We analyze here the interests of this technique when applied to different smartcard coprocessors dedicated to asymmetric cryptography implementations. This study leads us to discover and realize new attacks on RSA and ECC type algorithms with fewer curves than classical attacks. We also present how correlation analysis is a powerful tool to reverse engineer asymmetric implementations. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Amiel, F., Feix, B., & Villegas, K. (2007). Power analysis for secret recovering and reverse engineering of public key algorithms. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4876 LNCS, pp. 110–125). Springer Verlag. https://doi.org/10.1007/978-3-540-77360-3_8
Mendeley helps you to discover research relevant for your work.