摘要 |
<p>This method of protection upon the application of a cryptographic operation (O i ) to data of a first equivalence class associated with a first ideal of a ring comprises the implementation (20, 34) of a protection of said operation (O i ), comprising: the choice (24) of a second ideal (I2 ) of said ring defining a second equivalence class, said first and second (I2 ) ideals being comaximal, the determination (26) of an injective morphism (phi) of the set produced from said first and second equivalence classes onto a third equivalence class associated with an intersection of said first and second ideals, the choice (28) of an element (r) of said second class, the determination (30) of a transform (x̃i ) of said data (xi ) and of said element (r) by said morphism (), the application (32) of said operation (O i ) to said transform (x̃i ), the application (34) of a canonical projection (I) onto said first class.</p> |