发明名称 Transition between masked representations of a value during cryptographic calculations
摘要 In a method for the transition from a first masked representation of a value to be kept secret to a second masked representation of the value, according to a first aspect of the invention at least one previously calculated table with a plurality of entries is used, and the calculation is carried out depending on at least one veiling parameter, in order to prevent the value to be kept secret from being spied out. According to a second aspect of the invention, at least one comparison table is used, which, for each table index, provides the result of a comparison between a value dependent on the table index and a value dependent on at least one masking value. A computer program product and a device have corresponding features. The invention provides a technique for protecting the transition between masked representations of a value from being spied out, wherein the masked representations are based on different masking rules.
申请公布号 US2007058800(A1) 申请公布日期 2007.03.15
申请号 US20040570744 申请日期 2004.09.03
申请人 GIESECKE & DEVRIENT GMBH 发明人 NEISSE OLAF;PULKUS JURGEN
分类号 H04L9/28;H04K1/00;H04L9/00;H04L9/06 主分类号 H04L9/28
代理机构 代理人
主权项
地址