Coordinate Blinding Over Large Prime Fields

Download Now
Provided by: University of Brighton
Format: PDF
Side-channel analysis can be used to try and derive unknown information used in cryptographic algorithms, such as cryptographic keys. The first side-channel described in the literature was based on the total time taken to compute a cryptographic algorithm. Preventing this attack is well understood, as one just requires a regular algorithm to prevent any side-channel leakage. Another side-channel that has been described in the literature is based on the observation that the power consumption of a microprocessor is dependent on the instruction being executed and on any data being manipulated.
Download Now

Find By Topic