Lazy Leak Resistant Exponentiation in RNS - Archive ouverte HAL Accéder directement au contenu
Rapport (Rapport De Recherche) Année : 2016

Lazy Leak Resistant Exponentiation in RNS

Résumé

In [1] the authors introduced the leak resistant arithmetic in RNS to randomize RSA modular exponentiation. This randomization is meant to protect implementations on embedded device from side channel analysis. We propose in this paper a lazy version of the approach of [1] in the case of right-to-left square-and-multiply exponentiation. We show that this saves roughly 30% of the computation when the randomization is done at each loop iteration. We also show that the level of randomization of the proposed approach is better than the one of [1] after a few number of loop iterations.
Fichier principal
Vignette du fichier
randomized-exponentiation-rns11.pdf (366.85 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01330927 , version 1 (13-06-2016)

Identifiants

Citer

Andrea Lesavourey, Christophe Negre, Thomas Plantard. Lazy Leak Resistant Exponentiation in RNS. [Research Report] DALI (UPVD); LIRMM (UM, CNRS). 2016, pp.156-163. ⟨hal-01330927⟩
215 Consultations
140 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More