摘要
NTRU cryptosystem has been widely used in microsystems with low performance in computation. In 2010 Lee et al. gave several power analysis attacks on NTRU and three countermeasures, where they argued that only second-order power analysis can break their first countermeasure, and the combination of the first and third countermeasure is secure. In this paper we give efficient first-order collision attacks against all their countermeasures. Besides a gain of 108.4% and 78% in efficiency, our attacks cannot be avoided by any padding scheme. Furthermore, we discuss some countermeasures preventing our attacks.
源语言 | 英语 |
---|---|
页(从-至) | 601-609 |
页数 | 9 |
期刊 | Microprocessors and Microsystems |
卷 | 37 |
期 | 6-7 |
DOI | |
出版状态 | 已出版 - 2013 |
已对外发布 | 是 |
指纹
探究 'First-order collision attack on protected NTRU cryptosystem' 的科研主题。它们共同构成独一无二的指纹。引用此
Zheng, X., Wang, A., & Wei, W. (2013). First-order collision attack on protected NTRU cryptosystem. Microprocessors and Microsystems, 37(6-7), 601-609. https://doi.org/10.1016/j.micpro.2013.04.008