Data and computational fault detection mechanism for devices that perform modular exponentiation

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Fault attacks have become an efficient methodology for extracting secrets stored in embedded devices, and proper countermeasures against such attacks are nowadays considered necessary. This paper describes a simple method for foiling transient fault attacks on devices that perform modular exponentiation with a secret exponent. In the considered scenario, acknowledging an error only at the end of the computations leaks out secret information, and should be avoided. To tackle this difficulty, we propose a scheme that checks, independently, each step (i.e., multiplication/squaring) of the exponentiation algorithm, and aborts the procedure as soon as an error is detected, without completing the computation. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Gueron, S. (2006). Data and computational fault detection mechanism for devices that perform modular exponentiation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4236 LNCS, pp. 80–87). Springer Verlag. https://doi.org/10.1007/11889700_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free