Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Kento Oonishi"'
Autor:
Kento Oonishi, Noboru Kunihiro
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 4, Pp 1-16 (2023)
Shor's algorithm solves the integer factoring and discrete logarithm problems in polynomial time. Therefore, the evaluation of Shor's algorithm is essential for evaluating the security of currently used public-key cryptosystems because the integer fa
Externí odkaz:
https://doaj.org/article/1cca2604ddeb41acbc9a5cef851b59f3
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 3, Pp 1-18 (2022)
Control modular addition is a core arithmetic function, and we must consider the computational cost for actual quantum computers to realize efficient implementation. To achieve a low computational cost in a control modular adder, we focus on minimizi
Externí odkaz:
https://doaj.org/article/7d4e4062e387415394bcbdccfe402337
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 3, Pp 1-18 (2022)
Control modular addition is a core arithmetic function, and we must consider the computational cost for actual quantum computers to realize efficient implementation. To achieve a low computational cost in a control modular adder, we focus on minimizi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9181da3dc94bca56fdb958d5751c7ca2
http://arxiv.org/abs/2010.00255
http://arxiv.org/abs/2010.00255
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030409203
ICISC
ICISC
In this paper, we discuss side-channel attacks on the CRT-RSA scheme (RSA scheme with Chinese Remainder Theorem) implemented by the left-to-right sliding window method. This method calculates exponentiations by repeating squaring and multiplication.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::22a5fa60b1671dcbbf60aac315a12bf6
https://doi.org/10.1007/978-3-030-40921-0_17
https://doi.org/10.1007/978-3-030-40921-0_17
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method
Autor:
Kento Oonishi, Noboru Kunihiro
Publikováno v:
Information Security and Privacy ISBN: 9783030553036
ACISP
ACISP
We discuss side-channel attacks on CRT-RSA encryption or signature scheme (the RSA scheme with the Chinese remainder theorem) implemented via the sliding window method. The sliding window method calculates exponentiations through repeated squaring an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::713ca28a079dc6f69493ea95ca05ad99
https://doi.org/10.1007/978-3-030-55304-3_34
https://doi.org/10.1007/978-3-030-55304-3_34
Autor:
Kento Oonishi, Noboru Kunihiro
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030121457
ICISC
ICISC
In this paper, we perform a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT-RSA), against side-channel attacks. We discuss the methods for recovering the CRT-RSA secret keys by observing physical information.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::05f60112b46ad314994286c28dc0c149
https://doi.org/10.1007/978-3-030-12146-4_3
https://doi.org/10.1007/978-3-030-12146-4_3