Exclusive exponent blinding may not suffice to prevent timing attacks on RSA

14Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The references [1, 3, 9] treat timing attacks on RSA with CRT and Montgomery’s multiplication algorithm in unprotected implementations. It has been widely believed that exponent blinding would prevent any timing attack on RSA. At cost of significantly more timing measurements this paper extends the before-mentioned attacks to RSA with CRT when Montgomery’s multiplication algorithm and exponent blinding are applied. Simulation experiments are conducted, which confirm the theoretical results. Effective countermeasures exist. In particular, the attack efficiency is higher than in the previous version [12] while large parts of both papers coincide.

Cite

CITATION STYLE

APA

Schindler, W. (2015). Exclusive exponent blinding may not suffice to prevent timing attacks on RSA. In Lecture Notes in Computer Science (Vol. 9293, pp. 229–247). Springer Verlag. https://doi.org/10.1007/978-3-662-48324-4_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free