Hey everyone,

I know we use blinding at least for preventing timing attacks on RW
signatures, which has failed quite a bit in the past, but we have
successfully mitigated it :)

Now I've seen a paper on eprint about breaking exponent-blinding schemes
for RSA.
Now I'd like to know whether or not our RSA (or RW) blinding
implementation is affected by these attacks?

Paper name:
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Author:
Werner Schindler, BSI
Two versions:
One seemingly "pre" version as of October '14 and the current one as of
August '15.
https://eprint.iacr.org/2014/869.pdf

BR

JPM

-- 
-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to