SPA vulnerabilities of the binary extended Euclidean algorithm

The execution flow of the binary extended Euclidean algorithm (BEEA) is heavily dependent on its inputs. Taking advantage of that fact, this work presents a novel simple power analysis (SPA) of this algorithm that reveals some exploitable power consumption-related leakages. The exposed leakages make...

Full description

Saved in:
Bibliographic Details
Published in:Journal of cryptographic engineering Vol. 7; no. 4; pp. 273 - 285
Main Authors: Aldaya, Alejandro Cabrera, Sarmiento, Alejandro J. Cabrera, Sánchez-Solano, Santiago
Format: Journal Article
Language:English
Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2017
Springer Nature B.V
Subjects:
ISSN:2190-8508, 2190-8516
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first