-
1
-
-
35248880671
-
Fault attacks on RSA with CRT: Concrete results and practical countermeasures
-
CHES 2002
-
C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, J.-P. Seifert. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In CHES 2002, volume 2523 of LNCS, pages 260-275
-
LNCS
, vol.2523
, pp. 260-275
-
-
Aumüller, C.1
Bier, P.2
Fischer, W.3
Hofreiter, P.4
Seifert, J.-P.5
-
2
-
-
24144482876
-
The sorcerer's apprentice guide to fault attacks
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The sorcerer's apprentice guide to fault attacks. In Workshop on Fault Detection and Tolerance in Cryptography, 2004
-
(2004)
Workshop on Fault Detection and Tolerance in Cryptography
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
4
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and Rabin
-
Advances in Cryptology - EUROCRYPT '96, Springer
-
M. Bellare and P. Rogaway. The exact security of digital signatures - How to sign with RSA and Rabin. In Advances in Cryptology - EUROCRYPT '96, volume 1070 of LNCS, pages 399-416. Springer, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84983134283
-
Differential fault analysis on elliptic curve cryptosystems
-
Advances in Cryptology - CRYPTO 2000, Springer
-
I. Biehl, B. Meyer, and V. Müller. Differential fault analysis on elliptic curve cryptosystems. In Advances in Cryptology - CRYPTO 2000, vol. 1880 of LNCS, pages 131-146. Springer, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 131-146
-
-
Biehl, I.1
Meyer, B.2
Müller, V.3
-
6
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, Springer-Verlag
-
D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of checking cryptographic protocols for faults. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
7
-
-
3042641393
-
On the importance of eliminating errors in cryptographic computations
-
An earlier version appears in [6]
-
D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14(2):101-119, 2001. An earlier version appears in [6].
-
(2001)
Journal of Cryptology
, vol.14
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
8
-
-
18744405402
-
Elliptic curve cryptosystem in presence of permanent and transient faults
-
M. Ciet and M. Joye. Elliptic curve cryptosystem in presence of permanent and transient faults. Designs Codes and Cryptography 36(1), 2005.
-
(2005)
Designs Codes and Cryptography
, vol.36
, Issue.1
-
-
Ciet, M.1
Joye, M.2
-
9
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
Advances in Cryptology - EUROCRYPT '02, Springer
-
J.-S. Coron. Optimal security proofs for PSS and other signature schemes, In Advances in Cryptology - EUROCRYPT '02, volume 2332 of LNCS, pages 272-287. Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 272-287
-
-
Coron, J.-S.1
-
10
-
-
0004794569
-
Chinese remaindering based cryptosystems in the presence of faults
-
M. Joye, A.K. Lenstra, and J.-J. Quisquater. Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology 12(4):241-245, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, J.-J.3
-
11
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, Advances in Cryptology -CRYPTO '99, Springer-Verlag
-
P.C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology -CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
13
-
-
84941183570
-
Seiferts RSA fault attack: Simplified analysis and generalizations
-
J.A. Muir. Seiferts RSA fault attack: Simplified analysis and generalizations. IACR Eprint archive 2005.
-
IACR Eprint Archive 2005
-
-
Muir, J.A.1
-
15
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
J.-J. Quisquater and C. Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters 18(21):905-907, 1982.
-
(1982)
Electronics Letters
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
|