International audienceEmbedded exponentiation techniques have become a key concern for security and efficiency in hardware devices using public key cryptography. An exponentiation is basically a sequence of multiplications and squarings, but this sequence may reveal exponent bits to an attacker on an unprotected implementation. Although this subject has been covered for years, we present in this paper new exponentiation algorithms based on trading multiplications for squarings. Our method circumvents attacks aimed at distinguishing squarings from multiplications at a lower cost than previous techniques. Last but not least, we present new algorithms using two parallel squaring blocks which provide the fastest exponentiation to our knowledge
International audienceCountermeasures to defeat most of side-channel attacks onexponentiations are b...
AbstractThe modular exponentiation operation of the current algorithms for asymmetric cryptography i...
AbstractMaintaining the privacy and security of people information are two most important principles...
International audienceEmbedded exponentiation techniques have become a key concern for security and ...
Abstract. Embedded exponentiation techniques have become a key concern for security and efficiency i...
In order to prevent the SPA (Simple Power Analysis) attack against modular exponentiation algorithms...
International audienceWe introduce in this paper a technique in which we apply correlation analysis ...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protecte...
Public-key cryptosystems are broadly employed to provide security for digital information. Improving...
Public key cryptographic algorithms are typically based on group exponentiation algorithms where the...
Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attac...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
. A modular exponentiation is one of the most important operations in public-key cryptography. Howev...
RSA is a commonly used asymmetric key cryptosystem that is used in encrypting and signing messages. ...
International audienceCountermeasures to defeat most of side-channel attacks onexponentiations are b...
AbstractThe modular exponentiation operation of the current algorithms for asymmetric cryptography i...
AbstractMaintaining the privacy and security of people information are two most important principles...
International audienceEmbedded exponentiation techniques have become a key concern for security and ...
Abstract. Embedded exponentiation techniques have become a key concern for security and efficiency i...
In order to prevent the SPA (Simple Power Analysis) attack against modular exponentiation algorithms...
International audienceWe introduce in this paper a technique in which we apply correlation analysis ...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protecte...
Public-key cryptosystems are broadly employed to provide security for digital information. Improving...
Public key cryptographic algorithms are typically based on group exponentiation algorithms where the...
Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attac...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
. A modular exponentiation is one of the most important operations in public-key cryptography. Howev...
RSA is a commonly used asymmetric key cryptosystem that is used in encrypting and signing messages. ...
International audienceCountermeasures to defeat most of side-channel attacks onexponentiations are b...
AbstractThe modular exponentiation operation of the current algorithms for asymmetric cryptography i...
AbstractMaintaining the privacy and security of people information are two most important principles...