共 29 条
- [21] Messerges T.S., Dabdish E.A., Sloan R.H., Power analysis attacks of modular exponentiation in smartcards, CHES, 99, pp. 144-157, (1999)
- [22] Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, 2, pp. 120-126, (1978)
- [23] Schindler W., Itoh K., Exponent blinding does not always lift (partial) SPA resistance to higher-level security, Proceedings of International Conference on Applied Cryptography and Network Security, pp. 73-90, (2011)
- [24] Schindler W., Wiemers A., Power attacks in the presence of exponent blinding, Journal of Cryptographic Engineering, 4, 4, pp. 213-236, (2014)
- [25] Schindler W., Wiemers A., Generic power attacks on RSA with CRT and exponent blinding: New results, Journal of Cryptographic Engineering, 7, 4, pp. 1-18, (2017)
- [26] Vuillaume C., Endo T., Wooderson P., RSA key generation: New attacks, Proceedings of International Workshop on Constructive Side-Channel Analysis and Secure Design, pp. 105-119, (2012)
- [27] Witteman M.F., Van Woudenberg J.G., Menarini F., Defeating RSA multiply-Always and message blinding countermeasures, Proceedings of Cryptographers Track at the RSA Conference, pp. 77-88, (2011)
- [28] Wan W., Yang W., Chen J., An optimized cross correlation power attack of message blinding exponentiation algorithms, China Communications, 12, 6, pp. 22-32, (2015)
- [29] Zhao B., Wang L., Jiang K., Liang X., Shan W., Liu J., An improved power attack on small RSA public exponent, Proceedings of IEEE 12th International Conference on Computational Intelligence and Security, pp. 578-581, (2016)