-
1
-
-
33845228975
-
-
Technical Report UCAM-CL-TR-641, University of Cambridge, Computer Laboratory, August
-
R.J. Anderson, M. Bond, J. Clulow, S. Skorobogatov. Cryptographic processors - a survey, Technical Report UCAM-CL-TR-641, University of Cambridge, Computer Laboratory, August 2005.
-
(2005)
Cryptographic Processors - A Survey
-
-
Anderson, R.J.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
5
-
-
0040320732
-
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
-
LNCS 1361, Springer
-
F.Bao, R.H.Deng, Y.Han, A.Jeng, A.D.Nirasimhalu, T.Ngair. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. In Proc. of the 5th Workshop on Secure Protocols, LNCS 1361, Springer, 1997.
-
(1997)
Proc. of the 5th Workshop on Secure Protocols
-
-
Bao, F.1
Deng, R.H.2
Han, Y.3
Jeng, A.4
Nirasimhalu, A.D.5
Ngair, T.6
-
6
-
-
24144482876
-
The Sorcerer's apprentice guide to fault attacks
-
Florence
-
H.Bar-El, H.Choukri, D.Naccache, M.Tunstall, C.Whelan. The Sorcerer's Apprentice Guide to Fault Attacks, In Workshop on Fault Detection and Tolerance in Cryptography, Florence, 2004.
-
(2004)
Workshop on Fault Detection and Tolerance in Cryptography
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
8
-
-
84983134283
-
Differential fault attacks on elliptic curve cryptosystems
-
LNCS 1880, Ed. Mihir Bellare, Springer
-
I. Biehl, B. Meyer, V. Müller. Differential Fault Attacks on Elliptic Curve Cryptosystems, In Advances in Cryptology - Crypto 2000, LNCS 1880, Ed. Mihir Bellare, Springer, 2000.
-
(2000)
Advances in Cryptology - Crypto 2000
-
-
Biehl, I.1
Meyer, B.2
Müller, V.3
-
9
-
-
84958641478
-
Differential fault analysis of secret key cryptosystem
-
LNCS 1294, Springer
-
E.Biham, A.Shamir. Differential fault analysis of secret key cryptosystem, In Advances in Cryptology, CRYPTO '97, LNCS 1294, Springer, 1997.
-
(1997)
Advances in Cryptology, CRYPTO '97
-
-
Biham, E.1
Shamir, A.2
-
10
-
-
33845222573
-
On the importance of checking cryptographic protocols for faults
-
Springer
-
D.Boneh, R.A.DeMillo, R.J.Lipton. On the importance of checking cryptographic protocols for faults, Journal of Cryptology, 14(2), Springer, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.2
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
12
-
-
0001297528
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
LNCS 1109, Springer
-
P.Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology-CRYPTO'96, LNCS 1109, Springer, 1996.
-
(1996)
Advances in Cryptology-CRYPTO'96
-
-
Kocher, P.1
-
13
-
-
84939573910
-
Differential power analysis
-
LNCS 1294, Springer
-
P.Kocher, J.Jaffe, B.Jun. Differential Power Analysis, In Advances in Cryptology, CRYPTO'99, LNCS 1294, Springer, 1999.
-
(1999)
Advances in Cryptology, CRYPTO'99
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
14
-
-
35248837397
-
A differential fault attack technique against SPN structures, with application to the AES and KHAZAD
-
LNCS 2779, Springer
-
J.J.Quisquater, G.Piret. A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and KHAZAD, In Fifth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003), LNCS 2779, Springer, 2003.
-
(2003)
Fifth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)
-
-
Quisquater, J.J.1
Piret, G.2
-
15
-
-
47949098691
-
How to check modular exponentiation
-
Presented at rump session, Konstanz, May
-
A. Shamir. How to check modular exponentiation. Presented at EUROCRYPT'97 rump session, Konstanz, May 1997.
-
(1997)
EUROCRYPT'97
-
-
Shamir, A.1
-
18
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
S-M. Yen, M.Joye. Checking before output may not be enough against fault-based cryptanalysis. In IEEE Transactions on Computers, 49(9), 2000.
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.9
-
-
Yen, S.-M.1
Joye, M.2
|