Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asymétrique, algorithmes et implantations. (Thwart simple power analysis efficiently in asymmetric cryptographic applications, algorithms and implementations)

@inproceedings{Robert2015ContrerLS,
  title={Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asym{\'e}trique, algorithmes et implantations. (Thwart simple power analysis efficiently in asymmetric cryptographic applications, algorithms and implementations)},
  author={Jean-Marc Robert},
  year={2015}
}
The development of online communications and the Internet have made encrypted data exchange fast growing. This has been possible with the development of asymmetric cryptographic protocols, which make use of arithmetic computations such as modular exponentiation of large integer or elliptic curve scalar multiplication. These computations are performed by various platforms, including smart-cards as well as large and powerful servers. The platforms are subjects to attacks taking advantage of… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 56 REFERENCES

Digital Signature Standard (DSS). In Federal Information Processing Standards Publications, volume FIPS 186-3 of Federal Information Processing Standards Publications (NIST), page 93

  • Patrick Gallagher, Cita Furlani
  • National Institute of Standards and Technology,
  • 2009
Highly Influential
16 Excerpts

Similar Papers

Loading similar papers…