Abstract. We here consider the protection of prime number generation against Side-Channel Attacks. Indeed, there is a need now to perform this procedure on-chip, in insecure environments. Our work uses techniques published by Boneh and Franklin on the generation of shared RSA keys in 1997. Their procedure allows the distribution of the computations among dierent participants such that, at the end, each of them owns a part of the secret keys { including prime numbers {, but none of them knows anything about their actual value. We use this shared generation of primes to design a procedure where prime numbers are generated in a masked way. Thus doing we turn a distributed protocol into a secure implementation of prime generation, suitable for ...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
International audienceRSA public keys are central to many cryptographic applications; hence their va...
AbstractIt is shown that the popular RSA public key encryption scheme does not require two primes bu...
Public-key cryptography is rapidly becoming ubiquitous in many aspects of "electronic" lif...
We present a new protocol for efficient distributed computation modulo a shared secret. We further p...
Abstract. The generation of prime numbers underlies the use of most public-key cryptosystems, essent...
With the increasing amount of information transmitted over networks, there is a need to be able to k...
The numbers of primes generated by two prime generation methods are evaluated. The methods considere...
Since the discovery of the RSA encryption scheme, primality domain has gained much interest. For the...
Safe primes and safe RSA moduli are used in several cryptographic schemes. The most common notion is...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
In this era of digital age a lot of secret and non-secret data is transmitted over the internet. Cry...
In 1976, Diffie and Hellman introduced the idea of a public-key cryptosystem. Subsequently, Rivest, ...
Abstract — As the growth of the Internet and electronic commerce have brought to the forefront the i...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
International audienceRSA public keys are central to many cryptographic applications; hence their va...
AbstractIt is shown that the popular RSA public key encryption scheme does not require two primes bu...
Public-key cryptography is rapidly becoming ubiquitous in many aspects of "electronic" lif...
We present a new protocol for efficient distributed computation modulo a shared secret. We further p...
Abstract. The generation of prime numbers underlies the use of most public-key cryptosystems, essent...
With the increasing amount of information transmitted over networks, there is a need to be able to k...
The numbers of primes generated by two prime generation methods are evaluated. The methods considere...
Since the discovery of the RSA encryption scheme, primality domain has gained much interest. For the...
Safe primes and safe RSA moduli are used in several cryptographic schemes. The most common notion is...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
In this era of digital age a lot of secret and non-secret data is transmitted over the internet. Cry...
In 1976, Diffie and Hellman introduced the idea of a public-key cryptosystem. Subsequently, Rivest, ...
Abstract — As the growth of the Internet and electronic commerce have brought to the forefront the i...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough...
International audienceRSA public keys are central to many cryptographic applications; hence their va...
AbstractIt is shown that the popular RSA public key encryption scheme does not require two primes bu...