PDF下载 分享
[1]万武南,陈 俊.针对双重掩码模幂算法的二阶互相关功耗分析攻击[J].成都信息工程大学学报,2016,(04):353-357.
 WAN Wu-nan,CHEN Jun.A Second Order Cross Correlation Power Analysis Attack on Double Blinding Exponentiation Algorithms[J].Journal of Chengdu University of Information Technology,2016,(04):353-357.



[1] Kocher P, Jaffe J, Jun B. Differential power analysis[C]. Advances in Cryptology-CRYPTO'99, California, USA: Springer, 1999: 789-789.
[2] A P Fouque,F Valette, The Doubling Attack—WhyUpwards is Better Than Down wards,Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems(CHES '03),2003: 269-280.
[3] S M Yen, W C Lien, S.J. Moon,et al. Power Analysis by Exploiting Chosen Message and Internal Collisions-Vulnerability of Checking Mechanism for RSA-Decryption[C],Proc. Mycrypt '05,2005:183-195.
[4] Naofumi Homma, Atsushi Miyamoto,Takafumi Aoki,et al. Comparative power analysis of modular exponentiation algorithms[J]. IEEE Transations on computer,2010,59(6): 795-807.
[5] Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C]. Advances in Cryptology-CRYPTO'96, California, USA: Springer,1996: 104-113.
[6] M F Witteman, Jasper G J van Woudenberg,Federico Menarini. Defeating RSAMultiply-Always and Message Blinding Countermeasures[C].The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA,2011,14-18.
[7] HeeSeok Kim, Tae Hyun Kim, Joong Chul Yoon,et al. Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA[J]. ETRI Journal, 2010,32(1).
[8] E Akalp Kuzu, B Soysal, M Sahinoglu,et al.New cross correlation attack methods on the Montgomery Ladder implementation of RSA[C]. Advance Computing Conference(IACC), 2013 IEEE 3rd International,2013:138-142.
[9] E Akalp Kuzu, A Tangel.All bits cross correlation attack on the Montgomery Ladder implementation of RSA[C]. 18th International Conference on Digital Signal Processing(DSP),2013.
[10] E Akalp Kuzu,A Tangel.A new style CPA attack on the ML implementation of RSA[C].Computer Science and Engineering Conference(ICSEC),2014.
[11] C Clavier, B Feix, G Gagnerot,et al.Horizontal Correlation Analysis on Exponentiation[C]. Proc. ICICS, ser. Lecture Notes in Computer Science,2010,6476:46-61.
[12] A Bauer,E Jaulmes, E Prouff J Wild,et al.Side-Channel Attacksagainst Secure RSA Implementations[C]. Proc. CT-RSA, ser. Lecture Notes in Computer Science,2013,7779:1-17.
[13] A Bauer,E Jaulmes. Correlation Analysis against Protected SFM Implementations of RSA[C],Proc. INDOCRYPT, ser. Lecture Notes in Computer Science,2013,8520:98-115.
[14] S Bauer. Attacking Exponent Blinding in RSA without CRT[C].COSADE, ser. Lecture Notes in Computer Science,2012,7275:82-88.
[15] Werner Schindler. Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA[C].Cryptographic Hardware and Embedded Systems-CHES 2015. Lecture Notes in Computer Science,2015,2523:229-247.
[16] JaeCheol Ha, ChuHun Jun,JeaHoon Park,et al.A new CRT-RST Scheme Resistant to Power Analysis and Fault Attack[C]. InThe third 2008 ICCHIT,2008:351-356.


[1]万武南,陈 俊.针对Montgomery模幂算法的选择明文SPA攻击[J].成都信息工程大学学报,2016,(04):348.
 WAN Wu-nan,CHEN Jun.A Simple Power Analysis Attack on the Montgomery Modular Exponentiation Algorithms[J].Journal of Chengdu University of Information Technology,2016,(04):348.


收稿日期:2016-07-06 基金项目:国家自然科学基金面上资助项目(61572086); 四川省大数据与智慧城市创新开放基金资助项目(RWS-CYHKF-01-20150003); 四川省教育厅重点资助项目(16ZA0212)

更新日期/Last Update: 2016-03-30