-
2
-
-
0026397734
-
Differential Cryptanalysis of DES-like Crytptosystems
-
E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Crytptosystems", Journal of Cryptography, Vol. 4, No. 1, pp. 3-72, 1991.
-
(1991)
Journal of Cryptography
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
85025704284
-
Linear Cryptanalysis Method for des Cipher
-
Springer-Verlag
-
M. Matsui, "Linear Cryptanalysis Method for DES Cipher," Proceedings of Advances in Cryptology-Eurocrypt, Springer-Verlag, pp. 386-397, 1994.
-
(1994)
Proceedings of Advances in Cryptology-Eurocrypt
, pp. 386-397
-
-
Matsui, M.1
-
4
-
-
84958769993
-
Side-Channel Cryptanalysis of Product Ciphers
-
Springer, Sep
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, "Side-Channel Cryptanalysis of Product Ciphers," Proceedings of ESORICS, Springer, pp. 97-110, Sep 1998.
-
(1998)
Proceedings of ESORICS
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
5
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Proceedings of Eurocrypt, Lecture Notes in Computer Science, Springer-Verlag
-
D. Boneh, R. DeMillo, and R. Lipton, "On the importance of checking cryptographic protocols for faults", Proceedings of Eurocrypt, Lecture Notes in Computer Science, Springer-Verlag, LNCS 1233, pp. 37-51, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
6
-
-
0003291909
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Aug
-
E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", Proceedings of Crypto, Aug 1997.
-
(1997)
Proceedings of Crypto
-
-
Biham, E.1
Shamir, A.2
-
7
-
-
0000694402
-
Low cost attack on tamper resistant devices
-
th International Workshop on Security Protocols, Lecture Notes in Computer Sciences, Springer-Verlag
-
th International Workshop on Security Protocols, Lecture Notes in Computer Sciences, Springer-Verlag, LNCS 1361, 1997.
-
(1997)
LNCS
, vol.1361
-
-
Anderson, R.J.1
Kuhn, M.2
-
8
-
-
11244348664
-
-
C. Aumuller, P. Bier, P. Hofreiter, W. Fischer and J.-P. Seifert, "Fault attacks on RSA with CRT: concrete results and practical countermeasures," www.iacr.org/eprint/2002/072.pdf.
-
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
-
-
Aumuller, C.1
Bier, P.2
Hofreiter, P.3
Fischer, W.4
Seifert, J.-P.5
-
11
-
-
0027804595
-
VINCI: Secure test of a VLSI high-speed encryption system
-
Oct
-
H. Bonnenberg, A. Curiger, N. Felber, H. Kaeslin, R. Zimmermann and W. Fichtner, "VINCI: Secure test of a VLSI high-speed encryption system", Proceedings of IEEE International Test Conference, pp. 782-790, Oct 1993.
-
(1993)
Proceedings of IEEE International Test Conference
, pp. 782-790
-
-
Bonnenberg, H.1
Curiger, A.2
Felber, N.3
Kaeslin, H.4
Zimmermann, R.5
Fichtner, W.6
-
13
-
-
0029191896
-
On the VLSI implementation of the International Data Encryption Algorithm IDEA
-
S. Wolter, H. Matz, A. Schubert and R. Laur, "On the VLSI implementation of the International Data Encryption Algorithm IDEA", IEEE International symposium on Circuits and Systems, Vol.1, pp. 397-400, 1995.
-
(1995)
IEEE International Symposium on Circuits and Systems
, vol.1
, pp. 397-400
-
-
Wolter, S.1
Matz, H.2
Schubert, A.3
Laur, R.4
-
14
-
-
0036913523
-
Concurrent Error Detection of Fault Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
-
Dec
-
R Karri, K. Wu, P. Mishra and Y. Kim, "Concurrent Error Detection of Fault Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers," IEEE Transactions on CAD, Dec 2002.
-
(2002)
IEEE Transactions on CAD
-
-
Karri, R.1
Wu, K.2
Mishra, P.3
Kim, Y.4
-
15
-
-
84948745350
-
On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard
-
G. Bertoni, L. Breveglieri, I. Koren and V. Piuri, "On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard," Proceedings of ASAP'02, pp. 303-312, 2002.
-
(2002)
Proceedings of ASAP'02
, pp. 303-312
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Piuri, V.4
-
17
-
-
35248851909
-
-
"DES encryption and decryption unit with error checking," US patent US5432848, Jul 1995
-
A. S. Butter, C. Y. Kao and J. P. Kuruts, "DES encryption and decryption unit with error checking," US patent US5432848, Jul 1995.
-
-
-
Butter, A.S.1
Kao, C.Y.2
Kuruts, J.P.3
-
18
-
-
0037542974
-
A parity code based fault detection for an implementation of the advanced encryption standard
-
Nov.
-
G. Bertoni, L. Breveglieri, I. Koren, P. Maistri and V. Piuri, "A parity code based fault detection for an implementation of the advanced encryption standard," Proceedings IEEE International Symposium on Defect and Fault Tolerance in VLSI, pp. 51-59, Nov. 2002.
-
(2002)
Proceedings IEEE International Symposium on Defect and Fault Tolerance in VLSI
, pp. 51-59
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Maistri, P.4
Piuri, V.5
-
19
-
-
0037624935
-
Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard
-
April
-
G. Bertoni, L. Breveglieri, I. Koren, and V. Piuri, "Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard," IEEE Transactions on Computers, vol. 52, No. 4, pp. 492-505, April 2003.
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.4
, pp. 492-505
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Piuri, V.4
-
20
-
-
85020573990
-
On the design of S-boxes
-
Proceedings of CRYPTO '85, Springer Verlag Lecture Notes in Computer Science
-
A. F. Webster and S. E. Tavares. "On the design of S-boxes," Proceedings of CRYPTO '85, Springer Verlag Lecture Notes in Computer Science, LNCS 218, pp. 523-534, 1986.
-
(1986)
LNCS
, vol.218
, pp. 523-534
-
-
Webster, A.F.1
Tavares, S.E.2
-
21
-
-
78149236064
-
Avalanche characteristics of substitution permutation encryption networks
-
Sep
-
H. Heys and S. E. Tavares, "Avalanche characteristics of substitution permutation encryption networks," IEEE Transactions on Computers, vol. 44, no. 9, pp. 1131-1139, Sep 1995.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.9
, pp. 1131-1139
-
-
Heys, H.1
Tavares, S.E.2
|