Spa-based adaptive chosen-ciphertext attack on rsa implementation

65Citations
Citations of this article
60Readers
Mendeley users who have this article in their library.

Abstract

We describe an adaptive chosen-ciphertext attack on a smart card implementation of the RSA decryption algorithm in the presence of side-channel information leakage. We studied the information leakage through power consumption variation. Simple power analysis (SPA) of the smart card that is widely used for secure Internet banking, Web access and remote access to corporate networks, revealed macro characteristics caused by improper implementation of Chinese remaindering. The findings can be used to eventually improve future implementations of fast RSA decryption.

Cite

CITATION STYLE

APA

Novak, R. (2002). Spa-based adaptive chosen-ciphertext attack on rsa implementation. In Lecture Notes in Computer Science (Vol. 2274, pp. 252–262). Springer Verlag. https://doi.org/10.1007/3-540-45664-3_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free