메뉴 건너뛰기




Volumn 4236 LNCS, Issue , 2006, Pages 13-23

Wagner's attack on a secure CRT-RSA algorithm reconsidered

Author keywords

BOS scheme; CRT RSA; Fault attacks; Smartcards; Wagner's attack

Indexed keywords

ALGORITHMS; MATHEMATICAL MODELS; RANDOM PROCESSES; SECURITY OF DATA; SMART CARDS;

EID: 33845214167     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11889700_2     Document Type: Conference Paper
Times cited : (19)

References (14)
  • 2
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • [BDL01]
    • [BDL01] D. Boneh, R. A. DeMillo, and R. J. Lipton, On the importance of eliminating errors in cryptographic computations, J. Cryptology 14 (2001), no. 2, 101-119.
    • (2001) J. Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 3
    • 14844326209 scopus 로고    scopus 로고
    • A new CRT-RSA algorithm secure against Bellcore attacks
    • [BOS03] (V. Atluri and P. Liu, eds.), ACM SIGSAC, ACM Press
    • [BOS03] J. Blömer, M. Otto, and J.-P. Seifert, A new CRT-RSA algorithm secure against Bellcore attacks, Conference on Computer and Communications Security - CCS 2003 (V. Atluri and P. Liu, eds.), ACM SIGSAC, ACM Press, 2003, pp. 311-320.
    • (2003) Conference on Computer and Communications Security - CCS 2003 , pp. 311-320
    • Blömer, J.1    Otto, M.2    Seifert, J.-P.3
  • 4
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • [CCD00], Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2000, Worcester, MA, USA, Springer-Verlag
    • [CCD00] C. Clavier, J.-S. Coron, and N. Dabbous, Differential power analysis in the presence of hardware countermeasures, Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2000, Worcester, MA, USA, Lecture Notes in Computer Science, vol. 1965, Springer-Verlag, 2000, pp. 252-263.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 6
    • 33845188664 scopus 로고    scopus 로고
    • Fault resistant RSA implementation
    • [Gir05] (Edinburgh, Scotland) (L. Breveglieri and I. Koren, eds.), September 2
    • [Gir05] C. Giraud, Fault resistant RSA implementation, Fault Diagnosis and Tolerance in Cryptography - FDTC 2005 (Edinburgh, Scotland) (L. Breveglieri and I. Koren, eds.), September 2, 2005.
    • (2005) Fault Diagnosis and Tolerance in Cryptography - FDTC 2005
    • Giraud, C.1
  • 7
    • 33845204346 scopus 로고    scopus 로고
    • [Ott05], Ph.D. thesis
    • [Ott05] M. Otto, Fault attacks and countermeasures, Ph.D. thesis, University of Paderborn, 2005, http://wwwcs.uni-paderborn.de/cs/ag-bloemer/ forschung/publikationen/DissertationMartinOtto.pdf.
    • (2005) Fault Attacks and Countermeasures
    • Otto, M.1
  • 11
    • 4243387122 scopus 로고    scopus 로고
    • Method and apparatus for protecting public key schemes from timing and fault attacks
    • [Sha99], US Patent No. 5,991,415, Nov. 23, 1999
    • [Sha99] A. Shamir, Method and apparatus for protecting public key schemes from timing and fault attacks, 1999, US Patent No. 5,991,415, Nov. 23, 1999.
    • (1999)
    • Shamir, A.1
  • 12
    • 14844313695 scopus 로고    scopus 로고
    • Cryptanalysis of a provably secure CRT-RSA algorithm
    • [Wag04] (V. Atluri, B. Pfitzmann, and P. D. McDaniel, eds.), ACM SIGSAC, ACM Press
    • [Wag04] D. Wagner, Cryptanalysis of a provably secure CRT-RSA algorithm, Conference on Computer and Communications Security - CCS 2004 (V. Atluri, B. Pfitzmann, and P. D. McDaniel, eds.), ACM SIGSAC, ACM Press, 2004, pp. 92-97.
    • (2004) Conference on Computer and Communications Security - CCS 2004 , pp. 92-97
    • Wagner, D.1
  • 13
    • 84949936541 scopus 로고    scopus 로고
    • RSA speedup with residue number system immune against hardware fault Cryptanalysis
    • [YKLM01], Information Security and Cryptology - ICISC 2001 (4th International Conference Seoul, Korea, December 6-7, 2001. Proceedings) (K. Kim, ed.), Springer-Verlag, p. 397 ff.
    • [YKLM01] S.-M. Yen, S. Kim, S. Lim, and S. Moon, RSA speedup with residue number system immune against hardware fault Cryptanalysis, Information Security and Cryptology - ICISC 2001 (4th International Conference Seoul, Korea, December 6-7, 2001. Proceedings) (K. Kim, ed.), LNCS, vol. 2288, Springer-Verlag, 2001, p. 397 ff.
    • (2001) LNCS , vol.2288
    • Yen, S.-M.1    Kim, S.2    Lim, S.3    Moon, S.4
  • 14
    • 0038374937 scopus 로고    scopus 로고
    • RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
    • [YKLM03]
    • [YKLM03] S.-M. Yen, S. Kim, S. Lim, and S.-J. Moon, RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis, IEEE Transactions on Computers 52 (2003), no. 4, 461-472.
    • (2003) IEEE Transactions on Computers , vol.52 , Issue.4 , pp. 461-472
    • Yen, S.-M.1    Kim, S.2    Lim, S.3    Moon, S.-J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.