共 34 条
- [1] Combined Attack on Blinded Fault Resistant Exponentiation Algorithm and Efficient Countermeasure 2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 331 - 334
- [3] Timing attack against implementation of a parallel algorithm for modular exponentiation APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 319 - 330
- [4] A New FA and SPA Resistant Implementation of RSA 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 893 - 897
- [5] How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation? IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 241 - 269
- [7] New Cross Correlation Attack Methods on the Montgomery Ladder Implementation of RSA PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 138 - 142
- [8] A DPA attack against the modular reduction within a CRT implementation of RSA CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 228 - 243
- [9] All Bits Cross Correlation Attack on the Montgomery Ladder Implementation of RSA 2013 18TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2013,
- [10] More detail for a combined timing and power attack against implementations of RSA Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2898 : 245 - 263