The doubling attack - Why upwards is better than downwards

166Citations
Citations of this article
56Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The recent developments of side channel attacks have lead implementers to use more and more sophisticated countermeasures in critical operations such as modular exponentiation, or scalar multiplication in the elliptic curve setting. In this paper, we propose a new attack against a classical implementation of these operations that only requires two queries to the device. The complexity of this so-called "doubling attack" is much smaller than previously known ones. Furthermore, this approach defeats two of the three countermeasures proposed by Coron at CHES '99. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Fouque, P. A., & Valette, F. (2003). The doubling attack - Why upwards is better than downwards. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2779, 269–280. https://doi.org/10.1007/978-3-540-45238-6_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free