A Cluster Correlation power analysis against double blinding exponentiation

Journal of Information Security and Applications - Tập 48 - Trang 102357 - 2019
Wunan Wan1, Jun Chen1, Shibing Zhang1, Jinyue Xia2
1Chengdu University of Information Technology, Sichuan, China
2International Business Machines Corporation (IBM), New York, USA

Tài liệu tham khảo

Kocher, 1996, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, 1109, 104 Fouque, 2003, The doubling attack why upwards is better than downwards, 2779, 269 Yen, 2005, Power analysis by exploiting chosen message and internal collisions-vulnerability of checking mechanism for RSA-decryption, 183 Shamir, 2010, Comparative power analysis of modular exponentiation algorithms, IEEE Trans Comput, 59, 795, 10.1109/TC.2009.176 Kocher, 1999, Differential power analysis, 1666 Messerges, 1999, Investigations of power analysis attacks on smartcards, 151 Zhang, 2018, A highly effective dpa attack method based on genetic algorithm, Comput Mater Continua, 56, 325 Amiel, 2007, Power analysis for secret recovering and reverse engineering of public key algorithms, 4876, 110 Coron, 2003, Resistance against differential power analysis for elliptic curve cryptosystems, 1717, 292 Clavier, 2001, Universal exponentiation algorithm: a first step towards provable spa-resistance, 2162, 300 Kim, 2004, A secure and practical crt-based RSA to resist side channel attacks, 3043, 150 Zhang, 2019, Frequency offset-based ring oscillator physical unclonable function, IEEE Trans Multi-Scale Comput Syst, 4, 711, 10.1109/TMSCS.2018.2877737 Mamiya, 2004, Efficient countermeasure against RPA, DPA, and SPA, 3156, 343 Ha, 2008, A new crt-rsa scheme resistant to power analysis and fault attack, 351 Witteman, 2011, Defeating rsa multiply-always and message blinding countermeasures, 6558, 77 Kim, 2010, Practical second-order correlation power analysis on the message blinding method and its novel counter-measure for RSA, ETRI J, 32, 102, 10.4218/etrij.10.0109.0249 Clavier, 2010, Horizontal correlation analysis on exponentiation, 6476, 46 Bauer, 2012, Attacking exponent blinding in rsa without crt, 7275, 82 Bauer, 2013, Horizontal and vertical side channel attacks against secure rsa implementations, 7779, 1 Akalp Kuzu, 2014, A new style cpa attack on the ml implementation of RSA, 323 Akalp Kuzu, 2016, Correlation template matching cpa method. electroni-cletters, Electron Lett, 52, 1306, 10.1049/el.2016.0415 Wan, 2015, An optimized cross correlation power attack of message blinding exponentiation algorithms, China Commun, 12, 22, 10.1109/CC.2015.7122478 Xia, 2017, Epcbir: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing, Inf Sci, 397, 195, 10.1016/j.ins.2016.12.030 Xia, 2018, A novel weber local binary descriptor for fingerprint liveness detection, IEEE Trans Syst Man Cybern, 1 Xiao, 2018, Smk-means: an improved mini batch k-means algorithm based on mapreduce with big data, Comput Mater Continua, 56, 365 Batina, 2009, Differential cluster analysis, 5747, 112 Chen, 2013, Collision based on chosen message sample power clustering attack algorithm, China Commun, 10, 114, 10.1109/CC.2013.6520943 Heyszl, 2014, Clustering algorithms for non-profiled single-execution attacks on exponentiations, 8419, 79 Perin, 2014, Attacking randomized exponentiations using unsupervised learning, 8622, 144 Mahanta, 2018, Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomization, IET Inf Security, 12, 25, 10.1049/iet-ifs.2016.0508 Zhao, 2019, Design of feedback shift register of against power analysis attack, Comput Mater Continua, 58, 517, 10.32604/cmc.2019.03680