-
1
-
-
84956981493
-
Breaking public key cryptosystems and tamper resistant devices in the presence of transient faults
-
5-th Security Protocols Workshop, Springer-Verlag
-
F. Bao, R. Deng, Y Han, A. Jeng, A. Narasimhalu and T. Hgair, Breaking Public Key Cryptosystems and Tamper Resistant Devices in the Presence of Transient Faults, 5-th Security Protocols Workshop, Springer-Verlag, LNCS 1361, pp. 115-124, 1997.
-
(1997)
LNCS
, vol.1361
, pp. 115-124
-
-
Bao, F.1
Deng, R.2
Han, Y.3
Jeng, A.4
Narasimhalu, A.5
Hgair, T.6
-
2
-
-
24144482876
-
The sorcerers apprentice guide to fault attacks
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall and C. Whelan, The Sorcerers Apprentice Guide to Fault Attacks, Workshop on Fault Diagnosis and Tolerence in Cryptography in association with DSN 2004 - The International Conference on Dependable Systems and Networks, pp. 330-342, 2004.
-
(2004)
Workshop on Fault Diagnosis and Tolerence in Cryptography in Association with DSN 2004 - The International Conference on Dependable Systems and Networks
, pp. 330-342
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
3
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Advances in Cryptology - CRYPTO'97, Springer-Verlag
-
E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Advances in Cryptology - CRYPTO'97, Springer-Verlag, LNCS 1294, pp. 513-525, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
3042641393
-
On the importance of checking cryptographic protocols for faults
-
Springer-Verlag, nol. 14
-
D. Boneh, R. DeMillo and R. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Journal of Cryptology, Springer-Verlag, nol. 14, no. 2, pp. 101-119, 2001.
-
(2001)
Journal of Cryptology
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
5
-
-
84955621986
-
Hardness of computing the most significant bits of secret keys in diffie-hellman and related schemes
-
Advances in Cryptology - CRYPTO'96, Springer-Verlag
-
D. Boneh and R. Venkatesan, Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes, Advances in Cryptology - CRYPTO'96, Springer-Verlag, LNCS 1109, pp. 126-142, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 126-142
-
-
Boneh, D.1
Venkatesan, R.2
-
6
-
-
33645586365
-
Fault attacks on NESSIE signature and identification schemes
-
October
-
E. Dottax, Fault Attacks on NESSIE Signature and Identification Schemes, NESSIE Technical Report, October 2002.
-
(2002)
NESSIE Technical Report
-
-
Dottax, E.1
-
8
-
-
35048850492
-
Fault analysis of stream ciphers
-
Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
-
J. Hoch and A. Shamir, Fault Analysis of Stream Ciphers, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, LNCS 3156, pp. 240-253, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 240-253
-
-
Hoch, J.1
Shamir, A.2
-
9
-
-
0035427012
-
Lattice attacks on digital signature schemes
-
N.A. Howgrave-Graham and N.P. Smart, Lattice Attacks on Digital Signature Schemes, Design, Codes and Cryptography, vol. 23, pp. 283-290, 2001.
-
(2001)
Design, Codes and Cryptography
, vol.23
, pp. 283-290
-
-
Howgrave-Graham, N.A.1
Smart, N.P.2
-
10
-
-
35048873283
-
Concurrent error detection schemes for involution ciphers
-
Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
-
N. Joshi, K. Wu and R. Karri, Concurrent Error Detection Schemes for involution Ciphers, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, LNCS 3156, pp. 400-412, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 400-412
-
-
Joshi, N.1
Wu, K.2
Karri, R.3
-
13
-
-
35048881103
-
Can we trust cryptographic software? cryptographic flaws in GNU privacy guard vl.2.3
-
Advances in Cryptology - EUROCRYPT 2004, Springer-Verlag
-
P.Q. Nguyễn, Can we trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard vl.2.3, Advances in Cryptology - EUROCRYPT 2004, Springer-Verlag, LNCS 3027, pp. 555-570, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 555-570
-
-
Nguyễn, P.Q.1
-
14
-
-
33746391879
-
The insecurity of the digital signature algorithm with partially known nonces
-
Springer
-
P.Q. Nguyễn and I.E. Shparlinski, The Insecurity of the Digital Signature Algorithm with Partially Known Nonces, Journal of Cryptology, vol. 15, no. 3, pp. 151-176, Springer, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 151-176
-
-
Nguyễn, P.Q.1
Shparlinski, I.E.2
-
15
-
-
0141889703
-
The insecurity of the elliptic curve digital signature algorithm with partially known nonces
-
P.Q. Nguyễn and I.E. Shparlinski, The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces, Design, Codes and Cryptography, vol. 30, pp. 201-217, 2003.
-
(2003)
Design, Codes and Cryptography
, vol.30
, pp. 201-217
-
-
Nguyễn, P.Q.1
Shparlinski, I.E.2
-
16
-
-
33846867921
-
The two faces of lattices in cryptology
-
Cryptography and Lattices - CALC'01, Springer-Verlag
-
P.Q. Nguyễn and J. Stern, The two faces of lattices in cryptology, Cryptography and Lattices - CALC'01), Springer-Verlag, LNCS 2146, pp. 146-180, 2001.
-
(2001)
LNCS
, vol.2146
, pp. 146-180
-
-
Nguyễn, P.Q.1
Stern, J.2
-
17
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
C.P. Schnorr and M. Euchner, Lattice basis reduction: improved practical algorithms and solving subset sum problems, Math. Programming, vol. 66, pp. 181-199, 1994.
-
(1994)
Math. Programming
, vol.66
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
|