The recent developments of side channel attacks have lead implementers to use more and more sophisticated countermeasures in critical operations such as modular exponentiation, or scalar multiplication in the elliptic curve setting. In this paper, we propose a new attack against a classical implementation of these operations that only requires two queries to the device. The complexity of this so-called "doubling attack" is much smaller than previously known ones. Furthermore, this approach defeats two of the three countermeasures proposed by Coron at CHES '99. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Fouque, P. A., & Valette, F. (2003). The doubling attack - Why upwards is better than downwards. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2779, 269–280. https://doi.org/10.1007/978-3-540-45238-6_22
Mendeley helps you to discover research relevant for your work.