Square always exponentiation

  • Authors:
  • Christophe Clavier;Benoit Feix;Georges Gagnerot;Mylène Roussellet;Vincent Verneuil

  • Affiliations:
  • XLIM-CNRS, Université de Limoges, France;XLIM-CNRS, Université de Limoges, France;XLIM-CNRS, Université de Limoges, France;INSIDE Secure, Aix-en-Provence, France;INSIDE Secure, Aix-en-Provence, France

  • Venue:
  • INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Embedded exponentiation techniques have become a key concern for security and efficiency in hardware devices using public key cryptography. An exponentiation is basically a sequence of multiplications and squarings, but this sequence may reveal exponent bits to an attacker on an unprotected implementation. Although this subject has been covered for years, we present in this paper new exponentiation algorithms based on trading multiplications for squarings. Our method circumvents attacks aimed at distinguishing squarings from multiplications at a lower cost than previous techniques. Last but not least, we present new algorithms using two parallel squaring blocks which provide the fastest exponentiation to our knowledge.