Abstract. In this paper, we present novel randomized techniques to enhance Montgomery powering ladder. The proposed techniques increase the resistance against side-channel attacks and especially recently published corre-lation collision attacks in the horizontal setting. The first of these operates by randomly changing state such that the difference between registers varies, unpredictably, between two states. The second algorithm takes a random walk, albeit tightly bounded, along the possible addition chains required to compute an exponentiation. We also generalize the Montgomery powering ladder and present randomized (both left-to-right and right-to-left) m-ary exponentiation algorithms
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
Abstract- Elliptic curve cryptography (ECC) has attracted a lot of attention because it can provide ...
The iterative conditional branchings appear in various sensitive algorithms, like the modular expone...
Part 3: Secure Devices and Execution EnvironmentInternational audienceIn this paper, we present nove...
This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fa...
Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can...
Hitherto the duality between left-to-right and right-to-left exponentiation algorithms has been a lo...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...
International audienceThe modular exponentiation is crucial to the RSA cryptographic protocol, and v...
Recently, many physical attack types (e.g., timing attacks, power consumption attacks, fault attacks...
Abstract. In smartcard encryption and signature applications, randomised algorithms are used to incr...
International audienceIn this paper, we want to promote the influence of randomized arithmetic on th...
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis r...
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
Abstract- Elliptic curve cryptography (ECC) has attracted a lot of attention because it can provide ...
The iterative conditional branchings appear in various sensitive algorithms, like the modular expone...
Part 3: Secure Devices and Execution EnvironmentInternational audienceIn this paper, we present nove...
This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fa...
Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can...
Hitherto the duality between left-to-right and right-to-left exponentiation algorithms has been a lo...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...
International audienceThe modular exponentiation is crucial to the RSA cryptographic protocol, and v...
Recently, many physical attack types (e.g., timing attacks, power consumption attacks, fault attacks...
Abstract. In smartcard encryption and signature applications, randomised algorithms are used to incr...
International audienceIn this paper, we want to promote the influence of randomized arithmetic on th...
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis r...
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
Abstract- Elliptic curve cryptography (ECC) has attracted a lot of attention because it can provide ...
The iterative conditional branchings appear in various sensitive algorithms, like the modular expone...