作者: Gaël Hachez , Jean-Jacques Quisquater
关键词:
摘要: The Montgomery multiplication is commonly used as the core algorithm for cryptosystems based on modular arithmetic. With advent of new classes attacks (timing attacks, power attacks), implementation should be carefully studied to thwart those attacks. Recently, Colin D. Walter proposed a constant time this [17,18]. In paper, we propose an improved (faster) version implementation. We also provide figures about overhead these versions relatively speed optimised (theoretically and experimentally).