Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Message Blinding Method Requiring No Multiplicative Inversion for RSA

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Heeseok-
dc.contributor.authorHan, Dong-Guk-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorHa, Jaecheol-
dc.date.accessioned2021-09-05T03:27:18Z-
dc.date.available2021-09-05T03:27:18Z-
dc.date.created2021-06-15-
dc.date.issued2014-11-
dc.identifier.issn1539-9087-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/96914-
dc.description.abstractThis article proposes a new message blinding methods requiring no multiplicative inversion for RSA. Most existing message blinding methods for RSA additionally require the multiplicative inversion, even though computational complexity of this operation is O(n(3)) which is equal to that of the exponentiation. Thus, this additional operation is known to be the main drawback of the existing message blinding methods for RSA. In addition to requiring no additional multiplicative inversion, our new countermeasure provides the security against various power analysis attacks as well as general differential power analysis.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherASSOC COMPUTING MACHINERY-
dc.subjectPOWER ANALYSIS-
dc.titleMessage Blinding Method Requiring No Multiplicative Inversion for RSA-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Heeseok-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.1145/2560020-
dc.identifier.scopusid2-s2.0-84930345111-
dc.identifier.wosid000346219200007-
dc.identifier.bibliographicCitationACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, v.13, no.4-
dc.relation.isPartOfACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS-
dc.citation.titleACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS-
dc.citation.volume13-
dc.citation.number4-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusPOWER ANALYSIS-
dc.subject.keywordAuthorDesign-
dc.subject.keywordAuthorAlgorithms-
dc.subject.keywordAuthorPerformance-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorSide channel attacks-
dc.subject.keywordAuthorpower analysis-
dc.subject.keywordAuthormessage blinding method-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE