In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security against a powerful adversary by simulating fault injections in a fault model that includes random, zeroing, and skipping faults at all possible fault locations. We find that most of the countermeasures are vulnerable and do not provide sufficient security against all attacks in this fault model. After investigating how additional measures can be included to counter all possible fault injections, we present three countermeasures which prevent both power analysis and many kinds of fault attacks
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...
Abstract. The references [9, 3, 1] treat timing attacks on RSA with CRT and Montgomery’s multiplicat...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...
International audienceIn this work, we analyze all existing RSA-CRT countermeasures against the Bell...
RSA cryptosystem is one of the most widely used algorithms nowadays. However when it is implemented ...
In this paper we describe a new algorithm to prevent fault attacks on RSA signature algorithms using...
In this paper we analyze practical aspects of the differential fault attack on RSA published by Bone...
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA agai...
Abstract—Nowadays, Side Channel Attacks allow an attacker to recover secrets stored in embedded devi...
Abstract—Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems we...
Abstract—Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems we...
Abstract. Since their publication in 1996, Fault Attacks have been widely studied from both theoreti...
Since their publication in 1996, fault attacks have been widely studied from both theoretical and pr...
This article introduces a new Combined Attack on a CRT-RSA implementation resistant against Side-Cha...
Abstract. At CCS 2003, a new CRT-RSA algorithm was presented in [BOS03], which was claimed to be sec...
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...
Abstract. The references [9, 3, 1] treat timing attacks on RSA with CRT and Montgomery’s multiplicat...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...
International audienceIn this work, we analyze all existing RSA-CRT countermeasures against the Bell...
RSA cryptosystem is one of the most widely used algorithms nowadays. However when it is implemented ...
In this paper we describe a new algorithm to prevent fault attacks on RSA signature algorithms using...
In this paper we analyze practical aspects of the differential fault attack on RSA published by Bone...
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA agai...
Abstract—Nowadays, Side Channel Attacks allow an attacker to recover secrets stored in embedded devi...
Abstract—Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems we...
Abstract—Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems we...
Abstract. Since their publication in 1996, Fault Attacks have been widely studied from both theoreti...
Since their publication in 1996, fault attacks have been widely studied from both theoretical and pr...
This article introduces a new Combined Attack on a CRT-RSA implementation resistant against Side-Cha...
Abstract. At CCS 2003, a new CRT-RSA algorithm was presented in [BOS03], which was claimed to be sec...
Abstract. Security-aware embedded devices which are likely to operate in hostile environments need p...
Abstract. The references [9, 3, 1] treat timing attacks on RSA with CRT and Montgomery’s multiplicat...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...