SPA vulnerabilities of the binary extended Euclidean algorithm
The execution flow of the binary extended Euclidean algorithm (BEEA) is heavily dependent on its inputs. Taking advantage of that fact, this work presents a novel simple power analysis (SPA) of this algorithm that reveals some exploitable power consumption-related leakages. The exposed leakages make...
Saved in:
| Published in: | Journal of cryptographic engineering Vol. 7; no. 4; pp. 273 - 285 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.11.2017
Springer Nature B.V |
| Subjects: | |
| ISSN: | 2190-8508, 2190-8516 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!