In this paper, we present novel randomized techniques to enhance Montgomery powering ladder. The proposed techniques increase the resistance against side-channel attacks and especially recently published correlation collision attacks in the horizontal setting. The first of these operates by randomly changing state such that the difference between registers varies, unpredictably, between two states. The second algorithm takes a random walk, albeit tightly bounded, along the possible addition chains required to compute an exponentiation. We also generalize the Montgomery powering ladder and present randomized (both left-to-right and right-to-left) $m$-ary exponentiation algorithms
This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fa...
Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digi...
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...
Part 3: Secure Devices and Execution EnvironmentInternational audienceIn this paper, we present nove...
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis r...
Power Analysis has been widely studied since Kocher et al. presented in 1998 the initial Simple and ...
Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can...
Hitherto the duality between left-to-right and right-to-left exponentiation algorithms has been a lo...
Recently, many physical attack types (e.g., timing attacks, power consumption attacks, fault attacks...
Elliptic curve cryptography plays a crucial role in network and communication security. However, imp...
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
Abstract- Elliptic curve cryptography (ECC) has attracted a lot of attention because it can provide ...
International audienceIn this paper, we want to promote the influence of randomized arithmetic on th...
This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fa...
Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digi...
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...
Part 3: Secure Devices and Execution EnvironmentInternational audienceIn this paper, we present nove...
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis r...
Power Analysis has been widely studied since Kocher et al. presented in 1998 the initial Simple and ...
Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can...
Hitherto the duality between left-to-right and right-to-left exponentiation algorithms has been a lo...
Recently, many physical attack types (e.g., timing attacks, power consumption attacks, fault attacks...
Elliptic curve cryptography plays a crucial role in network and communication security. However, imp...
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it...
In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of fie...
Abstract- Elliptic curve cryptography (ECC) has attracted a lot of attention because it can provide ...
International audienceIn this paper, we want to promote the influence of randomized arithmetic on th...
This paper gives a comprehensive analysis of Montgomery powering ladder. Initially developed for fa...
Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digi...
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...