메뉴 건너뛰기




Volumn 49, Issue 9, 2000, Pages 967-970

Checking before output may not be enough against fault-based cryptanalysis

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CODING ERRORS; COMPUTER SYSTEM RECOVERY; DATA STORAGE EQUIPMENT; SECURITY OF DATA; SMART CARDS;

EID: 0034276289     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/12.869328     Document Type: Article
Times cited : (275)

References (23)
  • 1
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystem
    • Feb.
    • R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystem," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 2
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • July
    • T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, July 1985.
    • (1985) IEEE Trans. Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 5
    • 0004794569 scopus 로고    scopus 로고
    • Chinese Remaindering Based CryptoSystems in the Presence of Faults
    • M. Joye, A.K. Lenstra, and T.-T. Quisquater, "Chinese Remaindering Based CryptoSystems in the Presence of Faults," J. Cryptology, vol. 12, no. 4, pp. 241-245, 1999.
    • (1999) J. Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.K.2    Quisquater, T.-T.3
  • 6
    • 84956981493 scopus 로고    scopus 로고
    • Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
    • F. Bao, R.H. Deng, Y. Han, A. Jeng, A.D. Narasimbalu, and T. Ngair, "Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults," Proc. Security Protocols, pp. 115-124, 1998.
    • (1998) Proc. Security Protocols , pp. 115-124
    • Bao, F.1    Deng, R.H.2    Han, Y.3    Jeng, A.4    Narasimbalu, A.D.5    Ngair, T.6
  • 7
    • 33749904500 scopus 로고    scopus 로고
    • Breaking Real-World Implementations of Cryptosystems by Manipulating Their Random Number Generation
    • Tan./Feb.
    • Y. Zheng and T. Matsumoto, "Breaking Real-World Implementations of Cryptosystems by Manipulating Their Random Number Generation," Preproc. 1997 Symp. Cryptography and Information Security, Tan./Feb. 1997.
    • (1997) Preproc. 1997 Symp. Cryptography and Information Security
    • Zheng, Y.1    Matsumoto, T.2
  • 9
    • 47949098691 scopus 로고    scopus 로고
    • How to Check Modular Exponentiation
    • Presented May
    • A. Shamir, "How to Check Modular Exponentiation," Presented at the rump session of EUROCRYPT '97, May 1997
    • (1997) Rump Session of EUROCRYPT '97
    • Shamir, A.1
  • 10
    • 0002557564 scopus 로고    scopus 로고
    • Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective
    • D.P. Maher, "Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective," Proc. Financial Cryptography, pp. 109-121, 1997.
    • (1997) Proc. Financial Cryptography , pp. 109-121
    • Maher, D.P.1
  • 11
    • 18744414026 scopus 로고    scopus 로고
    • Comments on Some New Attacks on Cryptographic Devices
    • Redwood City, Calif., July
    • B.S. Kaliski Jr. and M.J.B. Robshaw, "Comments on Some New Attacks on Cryptographic Devices," RSA Laboratories Bulletin, no. 5, Redwood City, Calif., July 1997.
    • (1997) RSA Laboratories Bulletin , Issue.5
    • Kaliski Jr., B.S.1    Robshaw, M.J.B.2
  • 13
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper Resistant Devices
    • R. Anderson and M. Kuhn, "Low Cost Attacks on Tamper Resistant Devices," Proc. Security Protocols, pp. 125-136, 1998.
    • (1998) Proc. Security Protocols , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 14
    • 0004610703 scopus 로고    scopus 로고
    • Secure Deletion of Data from Magnetic and Solid-State Memory
    • P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," Proc. Sixth USENIX Security Symp., pp. 77-89, 1996.
    • (1996) Proc. Sixth USENIX Security Symp. , pp. 77-89
    • Gutmann, P.1
  • 15
    • 33749974292 scopus 로고    scopus 로고
    • Hardwaresicherheit von Mikrochips in Chipkarten
    • July
    • O. Kocar, "Hardwaresicherheit von Mikrochips in Chipkarten," Datenschutz und Datensicherheit, vol. 20, no. 7, pp. 421-424, July 1996.
    • (1996) Datenschutz und Datensicherheit , vol.20 , Issue.7 , pp. 421-424
    • Kocar, O.1
  • 16
    • 0038214614 scopus 로고    scopus 로고
    • Chinks in Digital Armor - Exploiting Faults to Break Smart-Card Cryptosystems
    • Feb.
    • I. Peterson, "Chinks in Digital Armor - Exploiting Faults to Break Smart-Card Cryptosystems," Science News, vol. 151, no. 5, pp. 78-79, Feb. 1997.
    • (1997) Science News , vol.151 , Issue.5 , pp. 78-79
    • Peterson, I.1
  • 18
    • 0020751036 scopus 로고
    • A Computer Algorithm for the Product AB Modulo M
    • May
    • G.R. Blakley, "A Computer Algorithm for the Product AB Modulo M," IEEE Trans. Computers, vol. 32, no. 5, pp. 497-500, May 1983.
    • (1983) IEEE Trans. Computers , vol.32 , Issue.5 , pp. 497-500
    • Blakley, G.R.1
  • 19
    • 3042549976 scopus 로고
    • Comments on 'A Computer Algorithm for the Product AB Modulo M
    • Mar.
    • K.R. Sloan Jr., "Comments on 'A Computer Algorithm for the Product AB Modulo M," IEEE Trans. Computers, vol. 34, no. 3, pp. 290-292, Mar. 1985.
    • (1985) IEEE Trans. Computers , vol.34 , Issue.3 , pp. 290-292
    • Sloan Jr., K.R.1
  • 20
    • 0003421346 scopus 로고    scopus 로고
    • RSA Hardware Implementation
    • RSA Laboratories, Redwood City, Calif., Apr.
    • C.K. Koç, "RSA Hardware Implementation," Technical Report TR 801, RSA Laboratories, Redwood City, Calif., Apr. 1996.
    • (1996) Technical Report TR 801
    • Koç, C.K.1
  • 23
    • 0003508568 scopus 로고
    • Nat'l Bureau of Standards, US Dept. of Commerce, Jan.
    • NBS FIPS PUB, "Data Encryption Standard," Nat'l Bureau of Standards, US Dept. of Commerce, Jan. 1977.
    • (1977) Data Encryption Standard


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.