We introduce a new type of timing attack which enables the factorization of an RSA-modulus if the exponentiation with the secret exponent uses the Chinese Remainder Theorem and Montgomery's algorithm. Its standard variant assumes that both exponentiations are carried out with a simple square and multiply algorithm. However, although its efficiency decreases, our attack can also be adapted to more advanced exponentiation algorithms. The previously known timing attacks do not work if the Chinese Remainder Theorem is used. © Springer-Verlag Berlin Heidelberg 2000.
CITATION STYLE
Schindler, W. (2000). A timing attack against RSA with the chinese remainder theorem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1965 LNCS, pp. 109–124). Springer Verlag. https://doi.org/10.1007/3-540-44499-8_8
Mendeley helps you to discover research relevant for your work.