Exponent Recoding and Regular Exponentiation Algorithms
- 1 January 2009
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message PairsLecture Notes in Computer Science, 2008
- Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-DecryptionLecture Notes in Computer Science, 2005
- Countermeasures for Preventing Comb Method Against SCA AttacksLecture Notes in Computer Science, 2005
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicityIEEE Transactions on Computers, 2004
- A More Flexible Countermeasure against Side Channel Attacks Using Window MethodLecture Notes in Computer Science, 2003
- The Doubling Attack – Why Upwards Is Better than DownwardsLecture Notes in Computer Science, 2003
- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel AttacksLecture Notes in Computer Science, 2002
- Securing Elliptic Curve Point Multiplication against Side-Channel AttacksLecture Notes in Computer Science, 2001
- Checking before output may not be enough against fault-based cryptanalysisIEEE Transactions on Computers, 2000
- A Survey of Fast Exponentiation MethodsJournal of Algorithms, 1998