Skip to main content
Log in

Side channel attack of multiplication in GF(q)–application to secure RSA-CRT

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Kocher P C, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 15–19

    Google Scholar 

  2. Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, 2004. 16–29

    Google Scholar 

  3. Boscher A, Naciri R, Prouff E. CRT RSA algorithm protected against fault attack. In: Proceedings of International Conference on Information Security Theory and Practices, Heraklion, 2007. 229–243

    Google Scholar 

  4. Boscher A, Handschuh H, Trichina E. Blinded fault resistant exponentiation revisited. In: Proceedings of Fault Diagnosis and Tolerance in Cryptography, Lausanne, 2010

    Google Scholar 

  5. Clavier C, Reynaud L. Improved blind side-channel analysis by exploitation of joint distributions of leakages. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems, Taipei, 2017. 24–44

    Google Scholar 

  6. Xu S, Lu X J, Zhang K Y, et al. Similar operation template attack on RSA-CRT as a case study. Sci China Inf Sci, 2018, 61: 032111

    Article  MathSciNet  Google Scholar 

  7. Giraud C. An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans Comput, 2006, 55: 1116–1120

    Article  Google Scholar 

  8. Kiss Á, Krämer J, Rauzy P. Algorithmic countermeasures against fault attacks and power analysis for RSACRT. In: Proceedings of Constructive Side-Channel Analysis and Secure Design, Graz, 2016. 111–129

    Chapter  Google Scholar 

  9. Kim S K, Kim T H, Han D G, et al. An efficient CRTRSA algorithm secure against power and fault attacks. J Syst Softw, 2011, 84: 1660–1669

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. U1536103, 61402286, 61472249, 61602239, 6157–2192, 61472250), and Minhang District Cooperation Plan (Grant No. 2016MH310).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dawu Gu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, S., Wang, W., Lu, X. et al. Side channel attack of multiplication in GF(q)–application to secure RSA-CRT. Sci. China Inf. Sci. 62, 39105 (2019). https://doi.org/10.1007/s11432-018-9488-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-018-9488-2

Navigation