4.48-GHz Fractional-${N}$ Frequency Synthesizer With Spurious-Tone Suppression via Probability Mass Redistribution

2019 ◽  
Vol 2 (11) ◽  
pp. 264-267 ◽  
Author(s):  
Yann Donnelly ◽  
Michael Keaveney ◽  
Michael Peter Kennedy ◽  
James Breslin ◽  
Stefano Tulisi ◽  
...  
GSA Today ◽  
2004 ◽  
Vol 14 (12) ◽  
pp. 32
Author(s):  
John H. Dilles ◽  
Greg B. Arehart ◽  
Peter I. Nabelek ◽  
Todd C. Feeley

2011 ◽  
Vol 6 (11) ◽  
pp. 1748-1760 ◽  
Author(s):  
Ralf Schröder ◽  
Johannes Schmidt ◽  
Stefanie Blättermann ◽  
Lucas Peters ◽  
Nicole Janssen ◽  
...  

2021 ◽  
Vol 15 (1) ◽  
pp. 408-433
Author(s):  
Margaux Dugardin ◽  
Werner Schindler ◽  
Sylvain Guilley

Abstract Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can be exploited even in stringent contexts. In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder regular exponentiation coupled with base blinding. Namely, we leverage on precharacterized multivariate probability mass functions of extra-reductions between pairs of (multiplication, square) in one iteration of the RSA algorithm and that of the next one(s) to build a maximum likelihood distinguisher. The efficiency of our attack (in terms of required traces) is more than double compared to the state-of-the-art. In addition to this result, we also apply our method to the case of regular exponentiation, base blinding, and modulus blinding. Quite surprisingly, modulus blinding does not make our attack impossible, and so even for large sizes of the modulus randomizing element. At the cost of larger sample sizes our attacks tolerate noisy measurements. Fortunately, effective countermeasures exist.


Sign in / Sign up

Export Citation Format

Share Document