메뉴 건너뛰기




Volumn 4236 LNCS, Issue , 2006, Pages 53-61

Cryptanalysis of two protocols for RSA with CRT based on fault infection

Author keywords

Chinese remainder theorem (CRT); Cryptography; Factorization attack; Fault infective CRT; Hardware fault cryptanalysis; Residue number system

Indexed keywords

COMPUTER CRIME; COMPUTER HARDWARE; FAILURE ANALYSIS; NETWORK PROTOCOLS; RELIABILITY THEORY; THEOREM PROVING;

EID: 33845216123     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11889700_5     Document Type: Conference Paper
Times cited : (18)

References (18)
  • 1
    • 0003130498 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • LNCS 1233, Springer-Verlag
    • D. Boneh, R.A. DeMillo, and R.J. Lipton, "On the importance of checking cryptographic protocols for faults," Advances in Cryptology - EUROCRYPT'97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - EUROCRYPT'97 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 4
    • 84948990454 scopus 로고    scopus 로고
    • Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective
    • LNCS 1318, Springer-Verlag
    • D.P. Maher, "Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective," Proceedings of Financial Cryptography, LNCS 1318, pp. 109-121, Springer-Verlag, 1997.
    • (1997) Proceedings of Financial Cryptography , pp. 109-121
    • Maher, D.P.1
  • 5
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • LNCS 1294, Springer-Verlag
    • E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," Advances in Cryptology - CRYPTO '97, LNCS 1294, pp. 513-525, Springer-Verlag, 1997
    • (1997) Advances in Cryptology - CRYPTO '97 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 7
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering based cryptosystems in the presence of faults
    • M. Joye, A.K, Lenstra, and J.-J, Quisquater, "Chinese remaindering based cryptosystems in the presence of faults," Journal of Cryptology, Vol. 12, No. 4, pp. 241-245, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 8
    • 47949098691 scopus 로고    scopus 로고
    • How to check modular exponentiation
    • presented at the Konstanz, Germany, 11-15th May
    • A. Shamir, "How to check modular exponentiation," presented at the rump session of EUROCRYPT '97, Konstanz, Germany, 11-15th May 1997.
    • (1997) Rump Session of EUROCRYPT '97
    • Shamir, A.1
  • 9
    • 4243387122 scopus 로고    scopus 로고
    • Method and apparatus for protecting public key schemes from timing and fault attacks
    • United States Patent 5991415, November 23
    • A. Shamir, "Method and apparatus for protecting public key schemes from timing and fault attacks," United States Patent 5991415, November 23, 1999.
    • (1999)
    • Shamir, A.1
  • 10
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • Sept.
    • S.M. Yen and M. Joye, "Checking before output may not be enough against fault-based cryptanalysis," IEEE Trans. on Computers, Vol. 49, No. 9, pp. 967-970, Sept. 2000.
    • (2000) IEEE Trans. on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.M.1    Joye, M.2
  • 11
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA publickey cryptosystem
    • J.-J. Quisquater and C. Couvreur, "Fast decipherment algorithm for RSA publickey cryptosystem," Electronics Letters, Vol. 18, No. 21, pp. 905-907, 1982.
    • (1982) Electronics Letters , vol.18 , Issue.21 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Commun. of ACM, Vol. 21, No. 2, pp. 120-126, 1978.
    • (1978) Commun. of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 16
    • 0038374937 scopus 로고    scopus 로고
    • RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
    • April
    • S.M. Yen, S.J. Kim, S.G. Lim, and S.J. Moon, "RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis," IEEE Trans. on Computers - Special issue on CHES, Vol. 52, No. 4, pp. 461-472, April 2003.
    • (2003) IEEE Trans. on Computers - Special Issue on CHES , vol.52 , Issue.4 , pp. 461-472
    • Yen, S.M.1    Kim, S.J.2    Lim, S.G.3    Moon, S.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.