@inproceedings{fd529faf0a6f4089ab999aafe7edd3e6,
title = "Data and computational fault detection mechanism for devices that perform modular exponentiation",
abstract = "Fault attacks have become an efficient methodology for extracting secrets stored in embedded devices, and proper countermeasures against such attacks are nowadays considered necessary. This paper describes a simple method for foiling transient fault attacks on devices that perform modular exponentiation with a secret exponent. In the considered scenario, acknowledging an error only at the end of the computations leaks out secret information, and should be avoided. To tackle this difficulty, we propose a scheme that checks, independently, each step (i.e., multiplication/squaring) of the exponentiation algorithm, and aborts the procedure as soon as an error is detected, without completing the computation.",
keywords = "Countermeasures, Embedded devices, Fault attacks, RSA, Safe errors, Smartcards",
author = "Shay Gueron",
year = "2006",
doi = "10.1007/11889700_8",
language = "English",
isbn = "3540462503",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "80--87",
booktitle = "Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Proceedings",
address = "Germany",
note = "Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006 ; Conference date: 10-10-2006 Through 10-10-2006",
}