메뉴 건너뛰기




Volumn 4249 LNCS, Issue , 2006, Pages 324-338

Why one should also secure RSA public key elements

Author keywords

Fault cryptanalysis; RSA; Seifert's attack; Standard mode

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; INFORMATION RETRIEVAL; KNOWLEDGE BASED SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33750696616     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11894063_26     Document Type: Conference Paper
Times cited : (27)

References (17)
  • 1
    • 35248880671 scopus 로고    scopus 로고
    • Fault attacks on RSA with CRT: Concrete results and practical countermeasures
    • CHES 2002
    • C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, J.-P. Seifert. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In CHES 2002, volume 2523 of LNCS, pages 260-275
    • LNCS , vol.2523 , pp. 260-275
    • Aumüller, C.1    Bier, P.2    Fischer, W.3    Hofreiter, P.4    Seifert, J.-P.5
  • 4
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • Advances in Cryptology - EUROCRYPT '96, Springer
    • M. Bellare and P. Rogaway. The exact security of digital signatures - How to sign with RSA and Rabin. In Advances in Cryptology - EUROCRYPT '96, volume 1070 of LNCS, pages 399-416. Springer, 1996.
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84983134283 scopus 로고    scopus 로고
    • Differential fault analysis on elliptic curve cryptosystems
    • Advances in Cryptology - CRYPTO 2000, Springer
    • I. Biehl, B. Meyer, and V. Müller. Differential fault analysis on elliptic curve cryptosystems. In Advances in Cryptology - CRYPTO 2000, vol. 1880 of LNCS, pages 131-146. Springer, 2000.
    • (2000) LNCS , vol.1880 , pp. 131-146
    • Biehl, I.1    Meyer, B.2    Müller, V.3
  • 6
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, Springer-Verlag
    • D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of checking cryptographic protocols for faults. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 7
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • An earlier version appears in [6]
    • D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14(2):101-119, 2001. An earlier version appears in [6].
    • (2001) Journal of Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 8
    • 18744405402 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem in presence of permanent and transient faults
    • M. Ciet and M. Joye. Elliptic curve cryptosystem in presence of permanent and transient faults. Designs Codes and Cryptography 36(1), 2005.
    • (2005) Designs Codes and Cryptography , vol.36 , Issue.1
    • Ciet, M.1    Joye, M.2
  • 9
    • 84947215491 scopus 로고    scopus 로고
    • Optimal security proofs for PSS and other signature schemes
    • Advances in Cryptology - EUROCRYPT '02, Springer
    • J.-S. Coron. Optimal security proofs for PSS and other signature schemes, In Advances in Cryptology - EUROCRYPT '02, volume 2332 of LNCS, pages 272-287. Springer, 2002.
    • (2002) LNCS , vol.2332 , pp. 272-287
    • Coron, J.-S.1
  • 10
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering based cryptosystems in the presence of faults
    • M. Joye, A.K. Lenstra, and J.-J. Quisquater. Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology 12(4):241-245, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 11
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener, editor, Advances in Cryptology -CRYPTO '99, Springer-Verlag
    • P.C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology -CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 13
    • 84941183570 scopus 로고    scopus 로고
    • Seiferts RSA fault attack: Simplified analysis and generalizations
    • J.A. Muir. Seiferts RSA fault attack: Simplified analysis and generalizations. IACR Eprint archive 2005.
    • IACR Eprint Archive 2005
    • Muir, J.A.1
  • 15
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • J.-J. Quisquater and C. Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters 18(21):905-907, 1982.
    • (1982) Electronics Letters , vol.18 , Issue.21 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.