메뉴 건너뛰기




Volumn 3386, Issue , 2005, Pages 16-28

Experimenting with faults, lattices and the DSA

Author keywords

DSA; Fault injection; Glitch attacks; Lattice reduction

Indexed keywords

FAULT TOLERANT COMPUTER SYSTEMS;

EID: 24144488226     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30580-4_3     Document Type: Conference Paper
Times cited : (61)

References (18)
  • 1
    • 84956981493 scopus 로고    scopus 로고
    • Breaking public key cryptosystems and tamper resistant devices in the presence of transient faults
    • 5-th Security Protocols Workshop, Springer-Verlag
    • F. Bao, R. Deng, Y Han, A. Jeng, A. Narasimhalu and T. Hgair, Breaking Public Key Cryptosystems and Tamper Resistant Devices in the Presence of Transient Faults, 5-th Security Protocols Workshop, Springer-Verlag, LNCS 1361, pp. 115-124, 1997.
    • (1997) LNCS , vol.1361 , pp. 115-124
    • Bao, F.1    Deng, R.2    Han, Y.3    Jeng, A.4    Narasimhalu, A.5    Hgair, T.6
  • 3
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Advances in Cryptology - CRYPTO'97, Springer-Verlag
    • E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Advances in Cryptology - CRYPTO'97, Springer-Verlag, LNCS 1294, pp. 513-525, 1997.
    • (1997) LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 4
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Springer-Verlag, nol. 14
    • D. Boneh, R. DeMillo and R. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Journal of Cryptology, Springer-Verlag, nol. 14, no. 2, pp. 101-119, 2001.
    • (2001) Journal of Cryptology , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 5
    • 84955621986 scopus 로고    scopus 로고
    • Hardness of computing the most significant bits of secret keys in diffie-hellman and related schemes
    • Advances in Cryptology - CRYPTO'96, Springer-Verlag
    • D. Boneh and R. Venkatesan, Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes, Advances in Cryptology - CRYPTO'96, Springer-Verlag, LNCS 1109, pp. 126-142, 1996.
    • (1996) LNCS , vol.1109 , pp. 126-142
    • Boneh, D.1    Venkatesan, R.2
  • 6
    • 33645586365 scopus 로고    scopus 로고
    • Fault attacks on NESSIE signature and identification schemes
    • October
    • E. Dottax, Fault Attacks on NESSIE Signature and Identification Schemes, NESSIE Technical Report, October 2002.
    • (2002) NESSIE Technical Report
    • Dottax, E.1
  • 8
    • 35048850492 scopus 로고    scopus 로고
    • Fault analysis of stream ciphers
    • Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
    • J. Hoch and A. Shamir, Fault Analysis of Stream Ciphers, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, LNCS 3156, pp. 240-253, 2004.
    • (2004) LNCS , vol.3156 , pp. 240-253
    • Hoch, J.1    Shamir, A.2
  • 10
    • 35048873283 scopus 로고    scopus 로고
    • Concurrent error detection schemes for involution ciphers
    • Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
    • N. Joshi, K. Wu and R. Karri, Concurrent Error Detection Schemes for involution Ciphers, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, LNCS 3156, pp. 400-412, 2004.
    • (2004) LNCS , vol.3156 , pp. 400-412
    • Joshi, N.1    Wu, K.2    Karri, R.3
  • 13
    • 35048881103 scopus 로고    scopus 로고
    • Can we trust cryptographic software? cryptographic flaws in GNU privacy guard vl.2.3
    • Advances in Cryptology - EUROCRYPT 2004, Springer-Verlag
    • P.Q. Nguyễn, Can we trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard vl.2.3, Advances in Cryptology - EUROCRYPT 2004, Springer-Verlag, LNCS 3027, pp. 555-570, 2004.
    • (2004) LNCS , vol.3027 , pp. 555-570
    • Nguyễn, P.Q.1
  • 14
    • 33746391879 scopus 로고    scopus 로고
    • The insecurity of the digital signature algorithm with partially known nonces
    • Springer
    • P.Q. Nguyễn and I.E. Shparlinski, The Insecurity of the Digital Signature Algorithm with Partially Known Nonces, Journal of Cryptology, vol. 15, no. 3, pp. 151-176, Springer, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 151-176
    • Nguyễn, P.Q.1    Shparlinski, I.E.2
  • 15
    • 0141889703 scopus 로고    scopus 로고
    • The insecurity of the elliptic curve digital signature algorithm with partially known nonces
    • P.Q. Nguyễn and I.E. Shparlinski, The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces, Design, Codes and Cryptography, vol. 30, pp. 201-217, 2003.
    • (2003) Design, Codes and Cryptography , vol.30 , pp. 201-217
    • Nguyễn, P.Q.1    Shparlinski, I.E.2
  • 16
    • 33846867921 scopus 로고    scopus 로고
    • The two faces of lattices in cryptology
    • Cryptography and Lattices - CALC'01, Springer-Verlag
    • P.Q. Nguyễn and J. Stern, The two faces of lattices in cryptology, Cryptography and Lattices - CALC'01), Springer-Verlag, LNCS 2146, pp. 146-180, 2001.
    • (2001) LNCS , vol.2146 , pp. 146-180
    • Nguyễn, P.Q.1    Stern, J.2
  • 17
    • 33846200465 scopus 로고
    • Lattice basis reduction: Improved practical algorithms and solving subset sum problems
    • C.P. Schnorr and M. Euchner, Lattice basis reduction: improved practical algorithms and solving subset sum problems, Math. Programming, vol. 66, pp. 181-199, 1994.
    • (1994) Math. Programming , vol.66 , pp. 181-199
    • Schnorr, C.P.1    Euchner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.