172
Views
7
CrossRef citations to date
0
Altmetric
Articles

A secure exponentiation algorithm resistant to a combined attack on RSA implementation

, , &
Pages 258-272 | Received 05 Jan 2014, Accepted 09 Jun 2014, Published online: 14 Jul 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Moushumi Barman & Hridoy Jyoti Mahanta. (2019) A randomised scheme for secured modular exponentiation against power analysis attacks. Cyber-Physical Systems 5:4, pages 209-230.
Read now

Articles from other publishers (6)

Hridoy Jyoti Mahanta, Keshab Nath, Amit Kumar Roy, Ketan Kotecha & Vijayakumar Varadaranjan. (2022) Using Genetic Algorithm in Inner Product to Resist Modular Exponentiation From Higher Order DPA Attacks. IEEE Access 10, pages 3238-3251.
Crossref
Thinh Hung Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam & Daniel Page. (2021) XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage. XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage.
Hridoy Jyoti Mahanta, Ajoy Kumar Khan & Somnath Mukhopadhyay. (2020) Resisting HODPA attacks in modular exponentiation using inner product with differential evolution. Innovations in Systems and Software Engineering 17:1, pages 53-62.
Crossref
Haibo Yi. (2020) A post-quantum secure communication system for cloud manufacturing safety. Journal of Intelligent Manufacturing 32:3, pages 679-688.
Crossref
Hridoy Jyoti Mahanta, Ajoy Kumar Khan & Somnath Mukhopadhyay. (2019) Modular exponentiation with inner product to resist higher-order DPA attacks. Innovations in Systems and Software Engineering 16:1, pages 87-97.
Crossref
Duc-Phong Le & Ali A. Ghorbani. (2020) Memory-Efficient Random Order Exponentiation Algorithm. IEEE Access 8, pages 146923-146931.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.