-
1
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Fumy, W, ed, Advances in Cryptology, EUROCRYPT '97. of, Springer
-
Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In Fumy, W., ed.: Advances in Cryptology - EUROCRYPT '97. Volume 1233 of Lecture Notes in Computer Science., Springer (1997) 37-51
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
2
-
-
35248880671
-
-
Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Kaliski Jr., B., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems -CHES 2002. 2523 of Lecture Notes in Computer Science., Springer (2002) 260-275
-
Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Kaliski Jr., B., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems -CHES 2002. Volume 2523 of Lecture Notes in Computer Science., Springer (2002) 260-275
-
-
-
-
3
-
-
14844326209
-
A New RSA-CRT Algorithm Secure Against Bellcore Attacks
-
Jajodia, S, Atluri, V, Jaeger, T, eds, ACM Press
-
Blömer, J., Otto, M., Seifert, J.P.: A New RSA-CRT Algorithm Secure Against Bellcore Attacks. In Jajodia, S., Atluri, V., Jaeger, T., eds.: ACM Conference on Computer and Communications Security - CCS'03, ACM Press (2003) 311-320
-
(2003)
ACM Conference on Computer and Communications Security - CCS'03
, pp. 311-320
-
-
Blömer, J.1
Otto, M.2
Seifert, J.P.3
-
4
-
-
33845212887
-
Practical Fault Countermeasures for Chinese Remaindering Based RSA
-
Breveglieri, L, Koren, I, eds
-
Ciet, M., Joye, M.: Practical Fault Countermeasures for Chinese Remaindering Based RSA. In Breveglieri, L., Koren, I., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'05. (2005) 124-132
-
(2005)
Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'05
, pp. 124-132
-
-
Ciet, M.1
Joye, M.2
-
5
-
-
33845188664
-
Fault Resistant RSA Implementation
-
Breveglieri, L, Koren, I, eds
-
Giraud, C.: Fault Resistant RSA Implementation. In Breveglieri, L., Koren, I., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'05. (2005) 142-151
-
(2005)
Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'05
, pp. 142-151
-
-
Giraud, C.1
-
6
-
-
4243387122
-
Improved method and apparatus for protecting public key schemes from timing and fault attacks
-
International Patent Number, WO 98/52319 () Also presented at the rump session of EUROCRYPT'97
-
Shamir, A.: Improved method and apparatus for protecting public key schemes from timing and fault attacks. International Patent Number : WO 98/52319 (1998) Also presented at the rump session of EUROCRYPT'97.
-
(1998)
-
-
Shamir, A.1
-
7
-
-
84949936541
-
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
-
Kim, K, ed, Information Security and Cryptology, ICISC, of, Springer
-
Yen, S.M., Kim, S.J., Lim, S.G., Moon, S.J.: RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. In Kim, K., ed.: Information Security and Cryptology - ICISC 2001. Volume 2288 of Lecture Notes in Computer Science., Springer (2001) 397-413
-
(2001)
Lecture Notes in Computer Science
, vol.2288
, pp. 397-413
-
-
Yen, S.M.1
Kim, S.J.2
Lim, S.G.3
Moon, S.J.4
-
8
-
-
33747617679
-
Cryptanalysis of a Provable Secure CRT-RSA Algorithm
-
Pfitzmann, B, Liu, P, eds, ACM Press
-
Wagner, D.: Cryptanalysis of a Provable Secure CRT-RSA Algorithm. In Pfitzmann, B., Liu, P., eds.: ACM Conference on Computer and Communications Security - CCS'04, ACM Press (2004) 82-91
-
(2004)
ACM Conference on Computer and Communications Security - CCS'04
, pp. 82-91
-
-
Wagner, D.1
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
11
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
Couvreur, C., Quisquater, J.J.: Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters 18 (1982) 905-907
-
(1982)
Electronics Letters
, vol.18
, pp. 905-907
-
-
Couvreur, C.1
Quisquater, J.J.2
-
13
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Koblitz, N, ed, Advances in Cryptology, CRYPTO '96. of, Springer
-
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Koblitz, N., ed.: Advances in Cryptology - CRYPTO '96. Volume 1109 of Lecture Notes in Computer Science., Springer (1996) 104-113
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M, ed, Advances in Cryptology, CRYPTO '99. of, Springer
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In Wiener, M., ed.: Advances in Cryptology - CRYPTO '99. Volume 1666 of Lecture Notes in Computer Science., Springer (1999) 388-397
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
84949514743
-
Power analysis attacks on modular exponentiation in smartcards. In Koç, Ç
-
Paar, C, eds, Cryptographic Hardware and Embedded Systems, CHES '99. of, Springer
-
Messerges, T., Dabbish, E., Sloan, R.: Power analysis attacks on modular exponentiation in smartcards. In Koç, Ç., Paar, C, eds.: Cryptographic Hardware and Embedded Systems - CHES '99. Volume 1717 of Lecture Notes in Computer Science., Springer (1999) 144-157
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 144-157
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
16
-
-
84944878354
-
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1997) Electronic version available at http://www.cacr.math.uwaterloo.ca/hac/.
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1997) Electronic version available at http://www.cacr.math.uwaterloo.ca/hac/.
-
-
-
-
17
-
-
84880293917
-
Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Koç, Ç, Paar, C, eds, Cryptographic Hardware and Embedded Systems, CHES '99. of, Springer
-
Coron, J.S.: Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems. In Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems - CHES '99. Volume 1717 of Lecture Notes in Computer Science., Springer (1999) 292-302
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 292-302
-
-
Coron, J.S.1
-
18
-
-
0004794569
-
Chinese Remaindering Based Cryptosystems in the Presence of Faults
-
Joye, M., Lenstra, A., Quisquater, J.J.: Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology 12 (1999) 241-246
-
(1999)
Journal of Cryptology
, vol.12
, pp. 241-246
-
-
Joye, M.1
Lenstra, A.2
Quisquater, J.J.3
-
19
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers 49 (2000) 967-970
-
(2000)
IEEE Transactions on Computers
, vol.49
, pp. 967-970
-
-
Yen, S.M.1
Joye, M.2
-
20
-
-
35248874869
-
-
Joye, M., Yen, S.M.: The Montgomery Powering Ladder. In Kaliski Jr., B., Koç, Ç., Paar, C, eds.: Cryptographic Hardware and Embedded Systems - CHES 2002. 2523 of Lecture Notes in Computer Science., Springer (2002) 291-302
-
Joye, M., Yen, S.M.: The Montgomery Powering Ladder. In Kaliski Jr., B., Koç, Ç., Paar, C, eds.: Cryptographic Hardware and Embedded Systems - CHES 2002. Volume 2523 of Lecture Notes in Computer Science., Springer (2002) 291-302
-
-
-
-
21
-
-
33845218764
-
An Adversarial Model for Fault Analysis Against LowCost Cryptographic Devices
-
Breveglieri, L, Koren, I, Naccache, D, Seifert, J.P, eds, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC'06. of, Springer
-
Lemke-Rust, K., Paar, C.: An Adversarial Model for Fault Analysis Against LowCost Cryptographic Devices. In Breveglieri, L., Koren, I., Naccache, D., Seifert, J.P., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'06. Volume 4236 of Lecture Notes in Computer Science., Springer (2006) 131-143
-
(2006)
Lecture Notes in Computer Science
, vol.4236
, pp. 131-143
-
-
Lemke-Rust, K.1
Paar, C.2
-
22
-
-
63449111952
-
-
Yen, S.M., Moon, S., Ha, J.C.: Permanent Fault Attack on RSA with CRT. In Safavi-Naini, R., Seberry, J., eds.: Information Security and Privacy - 8th Australasian Conference - ACISP 2003. 2727 of Lecture Notes in Computer Science., Springer (2003) 285-296
-
Yen, S.M., Moon, S., Ha, J.C.: Permanent Fault Attack on RSA with CRT. In Safavi-Naini, R., Seberry, J., eds.: Information Security and Privacy - 8th Australasian Conference - ACISP 2003. Volume 2727 of Lecture Notes in Computer Science., Springer (2003) 285-296
-
-
-
-
23
-
-
24144482876
-
The Sorcerer's Apprentice Guide to Fault Attacks
-
Breveglieri, L, Koren, I, eds, IEEE Computer Society
-
Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer's Apprentice Guide to Fault Attacks. In Breveglieri, L., Koren, I., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'04, IEEE Computer Society (2004) 330-342
-
(2004)
Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'04
, pp. 330-342
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
25
-
-
33845191171
-
Attacking Right-to-Left Modular Exponentiation with Timely Random Faults
-
Breveglieri, L, Koren, I, Naccache, D, Seifert, J.P, eds, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC'06. of, Springer
-
Boréale, M.: Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. In Breveglieri, L., Koren, I., Naccache, D., Seifert, J.P., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'06. Volume 4236 of Lecture Notes in Computer Science., Springer (2006) 24-35
-
(2006)
Lecture Notes in Computer Science
, vol.4236
, pp. 24-35
-
-
Boréale, M.1
-
26
-
-
35248881073
-
-
Fouque, P.A., Valette, F.: The Doubling Attack: Why Upwards is better than Downwards. In Walter, C., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems - CHES 2003. 2779 of Lecture Notes in Computer Science., Springer (2003) 269-280
-
Fouque, P.A., Valette, F.: The Doubling Attack: Why Upwards is better than Downwards. In Walter, C., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems - CHES 2003. Volume 2779 of Lecture Notes in Computer Science., Springer (2003) 269-280
-
-
-
-
27
-
-
33646183037
-
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSADecryption
-
Dawson, E, Vaudenay, S, eds, Progress in Cryptology, Mycrypt, of, Springer
-
Yen, S.M., Lien, W.C., Moon, S.J., Ha, J.C.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSADecryption. In Dawson, E., Vaudenay, S., eds.: Progress in Cryptology - Mycrypt 2005. Volume 3715 of Lecture Notes in Computer Science., Springer (2005) 183-195
-
(2005)
Lecture Notes in Computer Science
, vol.3715
, pp. 183-195
-
-
Yen, S.M.1
Lien, W.C.2
Moon, S.J.3
Ha, J.C.4
-
28
-
-
0001604533
-
Blind signatures for untraceable payments
-
Chaum, D, Rivest, R, Sherman, A, eds, Plenum Press
-
Chaum, D.: Blind signatures for untraceable payments. In Chaum, D., Rivest, R., Sherman, A., eds.: Advances in Cryptology - CRYPTO '82, Plenum Press (1982) 199-204
-
(1982)
Advances in Cryptology - CRYPTO '82
, pp. 199-204
-
-
Chaum, D.1
|