PROTECTING MODULAR INVERSION OPERATION FROM EXTERNAL MONITORING ATTACKS
Systems and methods for performing modular inversion operations in a manner protected from external monitoring attacks. An example method comprises: determining, by a processor, a first masked value based on a public cryptographic key and a first random integer value; determining a second masked val...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
28.01.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Systems and methods for performing modular inversion operations in a manner protected from external monitoring attacks. An example method comprises: determining, by a processor, a first masked value based on a public cryptographic key and a first random integer value; determining a second masked value based on the public cryptographic key and a second random integer value, and determining, based on the first masked value and the second masked value, a private cryptographic key represented by a modular inversion of the public cryptographic key. |
---|---|
Bibliography: | Application Number: US201816756099 |