Exponent Recoding and Regular Exponentiation Algorithms

  • Authors:
  • Marc Joye;Michael Tunstall

  • Affiliations:
  • Thomson R&D France, Technology Group, Corporate Research, Security Laboratory, Cesson-Sééévigné Cedex, France 35576;Department of Computer Science, University of Bristol, Bristol, United Kingdom BS8 1UB

  • Venue:
  • AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes methods of recoding exponents to allow for regular implementations of m -ary exponentiation algorithms. Recoding algorithms previously proposed in the literature do not lend themselves to being implemented in a regular manner, which is required if the implementation needs to resist side-channel attacks based on simple power analysis. The advantage of the algorithms proposed in this paper over previous work is that the recoding can be readily implemented in a regular manner. Recoding algorithms are proposed for exponentiation algorithms that use both signed and unsigned exponent digits.