Menu

Implementation Attacks on Exponentiation Algorithms

  • Friday, April 24, 2015 | 10:10 AM – 11:00 AM | West | Room: 2000

View all Sessions

Implementations of the Discrete Logarithm Based Cryptography are vulnerable on many side-channel and fault attacks. In this session, two new approaches for such attacks are presented.
Topic 1: Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Authors: Neil Hanley, HeeSeok Kim, Michael Tunstall
Topic 2: Cold Boot Attacks in the Discrete Logarithm Setting
Authors: Dale Sibborn, Bertram Poettering 

Participants

This document was retrieved from http://www.rsaconference.com/events/us15/agenda/sessions/1767/implementation-attacks-on-exponentiation on Mon, 16 Jan 2017 19:42:35 -0500.
© 2017 EMC Corporation. All rights reserved.