Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem

Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a recei...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: TRICHINA ELENA VASILIEVNA, BOSCHER ARNAUD, HANDSCHUH HELENA
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator TRICHINA ELENA VASILIEVNA
BOSCHER ARNAUD
HANDSCHUH HELENA
description Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US8774400B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US8774400B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US8774400B23</originalsourceid><addsrcrecordid>eNqNjUFqw0AMRb3poqS9gw7gQGgD6bolIZuskq6N8Gg8grFmkBSDL5LzxoYeoKv__-PBf20eF_JUAsSiULU49c4yQEBHwAFZzCFwjKTijBki3rMDCubZ2IBlKnmisBRQnsi8BUs4sraLFABDphEFep2rl0Gxphnutl54IugTCxmBLhJLIF1pWdZb8xIxG73_5aaB0_H2c95SLR1ZxZ6EvPu9fh0O-_1u9_3x-Q_lCWQIUfQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><source>esp@cenet</source><creator>TRICHINA ELENA VASILIEVNA ; BOSCHER ARNAUD ; HANDSCHUH HELENA</creator><creatorcontrib>TRICHINA ELENA VASILIEVNA ; BOSCHER ARNAUD ; HANDSCHUH HELENA</creatorcontrib><description>Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; JAMMING OF COMMUNICATION ; PHYSICS ; SECRET COMMUNICATION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140708&amp;DB=EPODOC&amp;CC=US&amp;NR=8774400B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140708&amp;DB=EPODOC&amp;CC=US&amp;NR=8774400B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>TRICHINA ELENA VASILIEVNA</creatorcontrib><creatorcontrib>BOSCHER ARNAUD</creatorcontrib><creatorcontrib>HANDSCHUH HELENA</creatorcontrib><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><description>Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>JAMMING OF COMMUNICATION</subject><subject>PHYSICS</subject><subject>SECRET COMMUNICATION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjUFqw0AMRb3poqS9gw7gQGgD6bolIZuskq6N8Gg8grFmkBSDL5LzxoYeoKv__-PBf20eF_JUAsSiULU49c4yQEBHwAFZzCFwjKTijBki3rMDCubZ2IBlKnmisBRQnsi8BUs4sraLFABDphEFep2rl0Gxphnutl54IugTCxmBLhJLIF1pWdZb8xIxG73_5aaB0_H2c95SLR1ZxZ6EvPu9fh0O-_1u9_3x-Q_lCWQIUfQ</recordid><startdate>20140708</startdate><enddate>20140708</enddate><creator>TRICHINA ELENA VASILIEVNA</creator><creator>BOSCHER ARNAUD</creator><creator>HANDSCHUH HELENA</creator><scope>EVB</scope></search><sort><creationdate>20140708</creationdate><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><author>TRICHINA ELENA VASILIEVNA ; BOSCHER ARNAUD ; HANDSCHUH HELENA</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US8774400B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2014</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>JAMMING OF COMMUNICATION</topic><topic>PHYSICS</topic><topic>SECRET COMMUNICATION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>TRICHINA ELENA VASILIEVNA</creatorcontrib><creatorcontrib>BOSCHER ARNAUD</creatorcontrib><creatorcontrib>HANDSCHUH HELENA</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>TRICHINA ELENA VASILIEVNA</au><au>BOSCHER ARNAUD</au><au>HANDSCHUH HELENA</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><date>2014-07-08</date><risdate>2014</risdate><abstract>Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US8774400B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
JAMMING OF COMMUNICATION
PHYSICS
SECRET COMMUNICATION
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T18%3A14%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=TRICHINA%20ELENA%20VASILIEVNA&rft.date=2014-07-08&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS8774400B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true