METHOD FOR SECURING CRYPTOGRAPHIC PROCESSING BY MEANS OF DECOYS
摘要
The inventive method for securing a cryptographic processing against physical attacks consists in repeating entirely or partially said cryptographic processing several times, i.e. one or several times on correct data, other times on incorrect data in order to decoy an attacker, wherein the selection of iterations performed on correct or incorrect data is carried out randomly and the incorrect data is ignored in the final result of processing.