Message Blinding Method Requiring No Multiplicative Inversion for RSA
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Heeseok | - |
dc.contributor.author | Han, Dong-Guk | - |
dc.contributor.author | Hong, Seokhie | - |
dc.contributor.author | Ha, Jaecheol | - |
dc.date.accessioned | 2021-09-05T03:27:18Z | - |
dc.date.available | 2021-09-05T03:27:18Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-11 | - |
dc.identifier.issn | 1539-9087 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/96914 | - |
dc.description.abstract | This article proposes a new message blinding methods requiring no multiplicative inversion for RSA. Most existing message blinding methods for RSA additionally require the multiplicative inversion, even though computational complexity of this operation is O(n(3)) which is equal to that of the exponentiation. Thus, this additional operation is known to be the main drawback of the existing message blinding methods for RSA. In addition to requiring no additional multiplicative inversion, our new countermeasure provides the security against various power analysis attacks as well as general differential power analysis. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.subject | POWER ANALYSIS | - |
dc.title | Message Blinding Method Requiring No Multiplicative Inversion for RSA | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Heeseok | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1145/2560020 | - |
dc.identifier.scopusid | 2-s2.0-84930345111 | - |
dc.identifier.wosid | 000346219200007 | - |
dc.identifier.bibliographicCitation | ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, v.13, no.4 | - |
dc.relation.isPartOf | ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS | - |
dc.citation.title | ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS | - |
dc.citation.volume | 13 | - |
dc.citation.number | 4 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | POWER ANALYSIS | - |
dc.subject.keywordAuthor | Design | - |
dc.subject.keywordAuthor | Algorithms | - |
dc.subject.keywordAuthor | Performance | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Side channel attacks | - |
dc.subject.keywordAuthor | power analysis | - |
dc.subject.keywordAuthor | message blinding method | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.