Comparative Power Analysis of Modular Exponentiation Algorithms

@article{Homma2010ComparativePA,
  title={Comparative Power Analysis of Modular Exponentiation Algorithms},
  author={Naofumi Homma and Atsushi Miyamoto and Takafumi Aoki and Akashi Satoh and Adi Shamir},
  journal={IEEE Transactions on Computers},
  year={2010},
  volume={59},
  pages={795-807}
}
This paper proposes new chosen-message power-analysis attacks for public-key cryptosystems based on modular exponentiation, where specific input pairs are used to generate collisions between squaring operations at different locations in the two power traces. Unlike previous attacks of this kind, the new attack can be applied to all standard implementations of the exponentiation process, namely binary (left-to-right and right-to-left), m-ary, and sliding window methods. The proposed attack can… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS