scispace - formally typeset
Search or ask a question

Showing papers on "Timing attack published in 1993"


Journal ArticleDOI
TL;DR: A fast exponentiation method using parallel processing is presented and can be employed with other existing methods for further speedup.
Abstract: In just over ten years, public-key crytography has gone from a novel concept to a mainstay of cryptographic technology Most public-key cryptosystems are constructed based on a modular exponentiation and each modular exponentiation, in turn, is made up of modular multiplications One challenge is how to reduce the running time of a modular exponentiation A fast exponentiation method using parallel processing is presented This method can be employed with other existing methods for further speedup The popular RSA cryptosystem is used as an example to demonstrate this study

14 citations