%0 Conference Proceedings %T Memory-Efficient Fault Countermeasures %+ Technicolor [Cesson Sévigné] %A Joye, Marc %A Karroumi, Mohamed %Z Part 2: Invasive Attacks %< avec comité de lecture %( Lecture Notes in Computer Science %B 10th Smart Card Research and Advanced Applications (CARDIS) %C Leuven, Belgium %Y Emmanuel Prouff %I Springer %3 Smart Card Research and Advanced Applications %V LNCS-7079 %P 84-101 %8 2011-09-14 %D 2011 %R 10.1007/978-3-642-27257-8_6 %K Fault attacks %K countermeasures %K exponentiation %K memory-constrained devices %K smart cards %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X An efficient countermeasure against fault attacks for a right-to-left binary exponentiation algorithm was proposed by Boscher, Naciri and Prouff (WISTP, 2007). This countermeasure was later generalized by Baek (Int. J. Inf. Sec., 2010) to the 2w-ary right-to-left algorithms for any $w \geqslant 1$ (the case w = 1 corresponding to the method of Boscher, Naciri and Prouff). In this paper, we modify theses algorithms, devise new coherence relations for error detection, and reduce the memory requirements without sacrificing the performance or the security. In particular, a full register (in working memory) can be gained compared to previous implementations. As a consequence, the implementations described in this paper are particularly well suited to applications for which memory is a premium. This includes smart-card implementations of exponentiation-based cryptosystems. %G English %Z TC 8 %Z TC 11 %Z WG 8.8 %Z WG 11.2 %2 https://inria.hal.science/hal-01596299/document %2 https://inria.hal.science/hal-01596299/file/978-3-642-27257-8_6_Chapter.pdf %L hal-01596299 %U https://inria.hal.science/hal-01596299 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TC8 %~ IFIP-WG11-2 %~ IFIP-CARDIS %~ IFIP-WG8-8 %~ IFIP-LNCS-7079