Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem
Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a recei...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | TRICHINA ELENA VASILIEVNA BOSCHER ARNAUD HANDSCHUH HELENA |
description | Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US8774400B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US8774400B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US8774400B23</originalsourceid><addsrcrecordid>eNqNjUFqw0AMRb3poqS9gw7gQGgD6bolIZuskq6N8Gg8grFmkBSDL5LzxoYeoKv__-PBf20eF_JUAsSiULU49c4yQEBHwAFZzCFwjKTijBki3rMDCubZ2IBlKnmisBRQnsi8BUs4sraLFABDphEFep2rl0Gxphnutl54IugTCxmBLhJLIF1pWdZb8xIxG73_5aaB0_H2c95SLR1ZxZ6EvPu9fh0O-_1u9_3x-Q_lCWQIUfQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><source>esp@cenet</source><creator>TRICHINA ELENA VASILIEVNA ; BOSCHER ARNAUD ; HANDSCHUH HELENA</creator><creatorcontrib>TRICHINA ELENA VASILIEVNA ; BOSCHER ARNAUD ; HANDSCHUH HELENA</creatorcontrib><description>Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; JAMMING OF COMMUNICATION ; PHYSICS ; SECRET COMMUNICATION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140708&DB=EPODOC&CC=US&NR=8774400B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140708&DB=EPODOC&CC=US&NR=8774400B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>TRICHINA ELENA VASILIEVNA</creatorcontrib><creatorcontrib>BOSCHER ARNAUD</creatorcontrib><creatorcontrib>HANDSCHUH HELENA</creatorcontrib><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><description>Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>JAMMING OF COMMUNICATION</subject><subject>PHYSICS</subject><subject>SECRET COMMUNICATION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjUFqw0AMRb3poqS9gw7gQGgD6bolIZuskq6N8Gg8grFmkBSDL5LzxoYeoKv__-PBf20eF_JUAsSiULU49c4yQEBHwAFZzCFwjKTijBki3rMDCubZ2IBlKnmisBRQnsi8BUs4sraLFABDphEFep2rl0Gxphnutl54IugTCxmBLhJLIF1pWdZb8xIxG73_5aaB0_H2c95SLR1ZxZ6EvPu9fh0O-_1u9_3x-Q_lCWQIUfQ</recordid><startdate>20140708</startdate><enddate>20140708</enddate><creator>TRICHINA ELENA VASILIEVNA</creator><creator>BOSCHER ARNAUD</creator><creator>HANDSCHUH HELENA</creator><scope>EVB</scope></search><sort><creationdate>20140708</creationdate><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><author>TRICHINA ELENA VASILIEVNA ; BOSCHER ARNAUD ; HANDSCHUH HELENA</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US8774400B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2014</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>JAMMING OF COMMUNICATION</topic><topic>PHYSICS</topic><topic>SECRET COMMUNICATION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>TRICHINA ELENA VASILIEVNA</creatorcontrib><creatorcontrib>BOSCHER ARNAUD</creatorcontrib><creatorcontrib>HANDSCHUH HELENA</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>TRICHINA ELENA VASILIEVNA</au><au>BOSCHER ARNAUD</au><au>HANDSCHUH HELENA</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem</title><date>2014-07-08</date><risdate>2014</risdate><abstract>Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman ("RSA") cryptography using the Chinese Remainder Theorem ("CRT") are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US8774400B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY JAMMING OF COMMUNICATION PHYSICS SECRET COMMUNICATION TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T18%3A14%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=TRICHINA%20ELENA%20VASILIEVNA&rft.date=2014-07-08&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS8774400B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |