A timing attack against RSA with the chinese remainder theorem

33Citations
Citations of this article
81Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We introduce a new type of timing attack which enables the factorization of an RSA-modulus if the exponentiation with the secret exponent uses the Chinese Remainder Theorem and Montgomery's algorithm. Its standard variant assumes that both exponentiations are carried out with a simple square and multiply algorithm. However, although its efficiency decreases, our attack can also be adapted to more advanced exponentiation algorithms. The previously known timing attacks do not work if the Chinese Remainder Theorem is used. © Springer-Verlag Berlin Heidelberg 2000.

Cite

CITATION STYLE

APA

Schindler, W. (2000). A timing attack against RSA with the chinese remainder theorem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1965 LNCS, pp. 109–124). Springer Verlag. https://doi.org/10.1007/3-540-44499-8_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free