메뉴 건너뛰기




Volumn , Issue , 2005, Pages 122-127

On authenticated computing and RSA-based authentication

Author keywords

Authenticated computing; Fault attacks; RSA; Secure boot

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER SOFTWARE; EXTRAPOLATION; PROBABILITY; REAL TIME SYSTEMS; ROM;

EID: 33745799002     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102138     Document Type: Conference Paper
Times cited : (31)

References (27)
  • 7
    • 33744529805 scopus 로고    scopus 로고
    • Cache-timing attacks on AES
    • D. J. Bernstein. Cache-timing attacks on AES. Technical report, http://cr.yp.to, http://cr.yp.to/papers.html#cachetiming, 2005.
    • (2005) Technical Report
    • Bernstein, D.J.1
  • 10
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • D. Boneh, R. A. DeMillo, and R. Lipton. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology, 14(2):101-120, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.2 , pp. 101-120
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.3
  • 11
    • 33745788433 scopus 로고
    • On generation of probable primes by incremental search
    • In Proc. of CRYPTO '92, Springer
    • J. Brandt and I. Damgard. On generation of probable primes by incremental search. In Proc. of CRYPTO '92, volume 740 of LNCS, pages 358-370. Springer, 1993.
    • (1993) LNCS , vol.740 , pp. 358-370
    • Brandt, J.1    Damgard, I.2
  • 15
    • 84947424562 scopus 로고    scopus 로고
    • Authenticated operation of open computing devices
    • In Proc. of ACISP '08, Springer
    • P. England and M. Peinado. Authenticated operation of open computing devices. In Proc. of ACISP '08, volume 2384 of LNCS, pages 346-261. Springer, 2002.
    • (2002) LNCS , vol.2384 , pp. 346-1261
    • England, P.1    Peinado, M.2
  • 16
    • 33745792431 scopus 로고    scopus 로고
    • TCG. Trusted computing group. http://www.trustedcomputinggroup.org.
  • 17
    • 27544440859 scopus 로고    scopus 로고
    • No Starch Press, Inc., San Francisco
    • A. "Bunnie" Huang. Hacking the Xbox. No Starch Press, Inc., San Francisco, 2003.
    • (2003) Hacking the Xbox
    • Huang, A.1
  • 18
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of DH, RSA, DSS and other systems
    • Springer
    • P. C. Kocher. Timing attacks on implementations of DH, RSA, DSS and other systems. In Proc. of CRYPTO '96, LNCS, pages 104-113. Springer, 1996.
    • (1996) Proc. of CRYPTO '96, LNCS , pp. 104-113
    • Kocher, P.C.1
  • 23
    • 0002368017 scopus 로고
    • On the normal density of primes in small intervals and the difference between consecutive primes
    • A. Selberg. On the normal density of primes in small intervals and the difference between consecutive primes. Arch. Math. Naturvid., 47:87-105, 1943.
    • (1943) Arch. Math. Naturvid. , vol.47 , pp. 87-105
    • Selberg, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.