Side channel attack of multiplication in GF(q)–application to secure RSA-CRT

This is a preview of subscription content, access via your institution.


  1. 1

    Kocher P C, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 15–19

    Google Scholar 

  2. 2

    Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, 2004. 16–29

    Google Scholar 

  3. 3

    Boscher A, Naciri R, Prouff E. CRT RSA algorithm protected against fault attack. In: Proceedings of International Conference on Information Security Theory and Practices, Heraklion, 2007. 229–243

    Google Scholar 

  4. 4

    Boscher A, Handschuh H, Trichina E. Blinded fault resistant exponentiation revisited. In: Proceedings of Fault Diagnosis and Tolerance in Cryptography, Lausanne, 2010

    Google Scholar 

  5. 5

    Clavier C, Reynaud L. Improved blind side-channel analysis by exploitation of joint distributions of leakages. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems, Taipei, 2017. 24–44

    Google Scholar 

  6. 6

    Xu S, Lu X J, Zhang K Y, et al. Similar operation template attack on RSA-CRT as a case study. Sci China Inf Sci, 2018, 61: 032111

    MathSciNet  Article  Google Scholar 

  7. 7

    Giraud C. An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans Comput, 2006, 55: 1116–1120

    Article  Google Scholar 

  8. 8

    Kiss Á, Krämer J, Rauzy P. Algorithmic countermeasures against fault attacks and power analysis for RSACRT. In: Proceedings of Constructive Side-Channel Analysis and Secure Design, Graz, 2016. 111–129

    Google Scholar 

  9. 9

    Kim S K, Kim T H, Han D G, et al. An efficient CRTRSA algorithm secure against power and fault attacks. J Syst Softw, 2011, 84: 1660–1669

    Article  Google Scholar 

Download references


This work was supported by National Natural Science Foundation of China (Grant Nos. U1536103, 61402286, 61472249, 61602239, 6157–2192, 61472250), and Minhang District Cooperation Plan (Grant No. 2016MH310).

Author information



Corresponding author

Correspondence to Dawu Gu.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Xu, S., Wang, W., Lu, X. et al. Side channel attack of multiplication in GF(q)–application to secure RSA-CRT. Sci. China Inf. Sci. 62, 39105 (2018).

Download citation