-
4
-
-
35248880671
-
-
Jr. et al. [14]
-
Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, and Jean-Pierre Seifert. Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Jr. et al. [14], pages 260-275.
-
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
, pp. 260-275
-
-
Aumüller, C.1
Bier, P.2
Fischer, W.3
Hofreiter, P.4
Seifert, J.-P.5
-
5
-
-
33745777234
-
The sorcerer's apprenctice's guide to fault attacks
-
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan, The Sorcerer's Apprenctice's Guide to Fault Attacks, available at http://eprint.iacr.org/2004/100. Technical report, 2004.
-
(2004)
Technical Report
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
6
-
-
26444596644
-
Impossible fault analysis of RC4 arid differential fault analysis of RC4
-
Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption: 12th International Workshop, Springer
-
Eli Biham, Louis Granboulan, and Phong Q. Nguyen, Impossible Fault Analysis of RC4 arid Differential Fault Analysis of RC4. In Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption: 12th International Workshop, volume 3557 of Lecture Notes in Computer Science, pages 359-367. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 359-367
-
-
Biham, E.1
Granboulan, L.2
Nguyen, P.Q.3
-
8
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Burton S. Kaliski Jr., editor, CRYPTO, Springer
-
Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In Burton S. Kaliski Jr., editor, CRYPTO, volume 1294 of Lecture Notes in Computer Science, pages 513-525. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
9
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults (Extended Abstract)
-
Walter Fumy, editor, Advances in Cryptology - EUROCRYPT '97, Springer
-
Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In Walter Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
10
-
-
33746625731
-
-
Walter et al. [27]
-
Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, and George S. Taylor. Security evaluation of asynchronous circuits. In Walter et al. [27], pages 137-151.
-
Security Evaluation of Asynchronous Circuits
, pp. 137-151
-
-
Fournier, J.J.A.1
Moore, S.W.2
Li, H.3
Mullins, R.D.4
Taylor, G.S.5
-
11
-
-
35048896529
-
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
-
Moni Naor, editor, Theory of Cryptography, Springer
-
Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, and Tal Rabin. Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. In Moni Naor, editor, Theory of Cryptography, volume 2951 of Lecture Notes in Computer Science, pages 258-277. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 258-277
-
-
Gennaro, R.1
Lysyanskaya, A.2
Malkin, T.3
Micali, S.4
Rabin, T.5
-
13
-
-
35048850492
-
Fault analysis of stream ciphers
-
Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer
-
Jonathan J. Hoch and Adi Shamir. Fault analysis of stream ciphers. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 240-253. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 240-253
-
-
Hoch, J.J.1
Shamir, A.2
-
14
-
-
33746583305
-
-
Burton S. Kaliski Jr., Cetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
-
Burton S. Kaliski Jr., Cetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2523 of Lecture Notes in Computer Science. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2523
-
-
-
17
-
-
33746591860
-
An adversarial model for fault analysis against low-cost cryptographic devices
-
Kerstin Lemke and Christof Paar. An Adversarial Model for Fault Analysis against Low-Cost Cryptographic Devices. In Workshop on Fault Detection and Tolerance in Cryptography, pages 82-94, 2005.
-
(2005)
Workshop on Fault Detection and Tolerance in Cryptography
, pp. 82-94
-
-
Lemke, K.1
Paar, C.2
-
21
-
-
84859826346
-
-
National Institute of Standards and Technology (NIST). Physical Reference Data, available at http://physics.nist.gov/PhysRefData/contents.html.
-
Physical Reference Data
-
-
-
23
-
-
33845228721
-
Eddy current for magnetic analysis with active sensor
-
David Samyde and Jean-Jacques Quisquater. Eddy Current for Magnetic Analysis with Active Sensor. In Proceedings of ESmart 2002, pages 185-194, 2002.
-
(2002)
Proceedings of ESmart 2002
, pp. 185-194
-
-
Samyde, D.1
Quisquater, J.-J.2
-
25
-
-
27244445173
-
Semi-invasive attacks - A new approach to hardware security analysis
-
Sergei S. Skorobogatov, Semi-invasive attacks - A new approach to hardware security analysis, available at http://www.cl.cam.ac.uk/techreports/ucam-cl-tr-630.pdf. Technical report, 2005.
-
(2005)
Technical Report
-
-
Skorobogatov, S.S.1
-
26
-
-
84941150092
-
ECRYT D.VAM.4: Electromagnetic analysis and fault attacks: State of the art
-
F.-X. Standaert, L. Batina, E. de Mulder, K. Lemke, E. Oswald, and G. Piret. ECRYT D.VAM.4: Electromagnetic Analysis and Fault Attacks: State of the Art. Technical report, 2005.
-
(2005)
Technical Report
-
-
Standaert, F.-X.1
Batina, L.2
De Mulder, E.3
Lemke, K.4
Oswald, E.5
Piret, G.6
-
27
-
-
33746628668
-
-
Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CUES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, Springer
-
Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CUES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, volume 2779 of Lecture Notes in Computer Science. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2779
-
-
|