Power Attack on Small RSA Public Exponent

@inproceedings{Fouque2006PowerAO,
  title={Power Attack on Small RSA Public Exponent},
  author={Pierre-Alain Fouque and S{\'e}bastien Kunz-Jacques and Gwena{\"e}lle Martinet and Fr{\'e}d{\'e}ric Muller and Fr{\'e}d{\'e}ric Valette},
  booktitle={CHES},
  year={2006}
}
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 2 +1, and when the classical exponent randomization is used. This attack works even if blinding is used on the messages. From a Simple Power Analysis (SPA) we study the problem of recovering the RSA private key when non consecutive bits of it leak from the implementation. We also show that such information can be gained from sliding window implementations not protected against SPA. 
Highly Cited
This paper has 39 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 20 extracted citations

Similar Papers

Loading similar papers…