-
1
-
-
0003130498
-
On the importance of checking cryptographic protocols for faults
-
Advances in Cryptology, EURO'CRYPT''97, Springer-Verlag
-
D. Boneh, R.A. DeMillo, and R.J. Lipton, "On the importance of checking cryptographic protocols for faults," In Advances in Cryptology - EURO'CRYPT''97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
2
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Advances in Cryptology, CRYPTO '97, Springer-Verlag, Berlin
-
E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," In Advances in Cryptology - CRYPTO '97, LNCS 1294, pp. 513-525, Springer-Verlag, Berlin, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
0004794569
-
Chinese remaindering based cryptosystems in the presence of faults
-
M. Joye, A.K. Lenstra, and J.-J. Quisquater, "Chinese remaindering based cryptosystems in the presence of faults," Journal of Cryptology, vol. 12, no. 4, pp. 241-245, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, J.-J.3
-
4
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
Sept
-
S.M. Yen and M. Joye, "Checking before output may not be enough against fault-based cryptanalysis," IEEE Trans, on Computers, vol. 49, no. 9, pp. 967-970, Sept. 2000.
-
(2000)
IEEE Trans, on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.M.1
Joye, M.2
-
5
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Advances in Cryptology, CRYPTO '96, Springer-Verlag
-
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," In Advances in Cryptology - CRYPTO '96, LNCS 1109, pp. 104-113, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
6
-
-
0038110492
-
A practical implementation of the timing attack
-
UCL, Louvain-la-Neuve, Belgium, Sep. 14-16
-
J.F. Dhem, F. Koeune, P.A. Leroux, P. Mestre, J.J. Quisquater, and J.L. Willems, "A practical implementation of the timing attack," In Proceedings of CARDIS '98 -Third Smart Card Research and Advanced Application Conference, UCL, Louvain-la-Neuve, Belgium, Sep. 14-16, 1998.
-
(1998)
Proceedings of CARDIS '98 -Third Smart Card Research and Advanced Application Conference
-
-
Dhem, J.F.1
Koeune, F.2
Leroux, P.A.3
Mestre, P.4
Quisquater, J.J.5
Willems, J.L.6
-
7
-
-
24144497857
-
A timing attack against Rijndael,
-
Technical Report CG-1999/1, Université catholique de Louvain, June
-
F. Koeune and J.-J. Quisquater, "A timing attack against Rijndael," Technical Report CG-1999/1, Université catholique de Louvain, June 1999.
-
(1999)
-
-
Koeune, F.1
Quisquater, J.-J.2
-
8
-
-
84939573910
-
Differential power analysis
-
Advances in Cryptology, CRYPTO '99, Springer-Verlag
-
P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," In Advances in Cryptology - CRYPTO '99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
-
(1666)
LNCS
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
9
-
-
84949514743
-
Power analysis attacks of modular exponentiation in smartcards
-
Cryptographic Hardware and Embedded Systems, CHES '99, Springer-Verlag
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Power analysis attacks of modular exponentiation in smartcards," In Cryptographic Hardware and Embedded Systems - CHES '99, LNCS 1717, pp. 144-157, Springer-Verlag, 1999.
-
(1717)
LNCS
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
10
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Cryptographic Hardware and Embedded Systems, CHES2000, Springer-Verlag
-
C. Clavier, J.-S. Coron, and N. Dabbous, "Differential power analysis in the presence of hardware countermeasures," In Cryptographic Hardware and Embedded Systems - CHES2000, LNCS 1965, pp. 252-263, Springer-Verlag, 2000.
-
(1965)
LNCS
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
11
-
-
84974679353
-
Securing the AES finalists against power analysis attacks
-
Proceedings of Fast Software Encryption Workshop, FSE 2000, Springer-Verlag
-
T.S. Messerges, "Securing the AES finalists against power analysis attacks," In Proceedings of Fast Software Encryption Workshop - FSE 2000, LNCS 1978, pp. 150-164, Springer-Verlag, 2001.
-
(1978)
LNCS
, pp. 150-164
-
-
Messerges, T.S.1
-
12
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Cryptographic Hardware and Embedded Systems, CHES 2000, Springer-Verlag
-
T.S. Messerges, "Using second-order power analysis to attack DPA resistant software," In Cryptographic Hardware and Embedded Systems - CHES 2000, LNCS 1965, pp. 238-251, Springer-Verlag, 2000.
-
(1965)
LNCS
, pp. 238-251
-
-
Messerges, T.S.1
-
13
-
-
84943615552
-
An implementation of DES and AES, secure against some attacks
-
Cryptographic Hardware and Embedded Systems, CHES 2001, Springer-Verlag
-
M. Akkar and C. Giraud, "An implementation of DES and AES, secure against some attacks," In Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp. 309-318, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 309-318
-
-
Akkar, M.1
Giraud, C.2
-
14
-
-
0004181422
-
AES Proposal: Rijndael
-
available at URL
-
J. Daemen and V. Rijmen, "AES Proposal: Rijndael," AES submission, 1998, available at URL 〈http://csrc.nist.gov/encryption/aes/ aes-home.htm〉.
-
(1998)
AES submission
-
-
Daemen, J.1
Rijmen, V.2
-
15
-
-
14344276582
-
Performance evaluation of AES finalists on the high-end smart card
-
April 13-14
-
F. Sano, M. Koike, S. Kawamura, and M. Shiba, "Performance evaluation of AES finalists on the high-end smart card," In Proceedings of the Third Advanced Encryption Standard (AES) Candidate Conference, pp. 82-93, April 13-14, 2000.
-
(2000)
Proceedings of the Third Advanced Encryption Standard (AES) Candidate Conference
, pp. 82-93
-
-
Sano, F.1
Koike, M.2
Kawamura, S.3
Shiba, M.4
-
16
-
-
68549126765
-
Smartly analyzing the simplicity and the power of SPA on smartcards
-
Cryptographic Hardware and Embedded Systems, CHES 2000, Springer-Verlag
-
R.M. Sommer, "Smartly analyzing the simplicity and the power of SPA on smartcards," In Cryptographic Hardware and Embedded Systems - CHES 2000, LNCS 1965, pp. 78-92, Springer-Verlag, 2000.
-
(1965)
LNCS
, pp. 78-92
-
-
Sommer, R.M.1
-
17
-
-
0142226722
-
Fault based cryptanalysis of the Advanced Encryption Standard (AES)
-
available at URL
-
J. Blömer and J.P. Seifert, "Fault based cryptanalysis of the Advanced Encryption Standard (AES)," Cryptology ePrint Archive of IACR, No. 075, 2002, available at URL 〈http://eprint.iacr.org/2002/075〉.
-
(2002)
Cryptology ePrint Archive of IACR
, Issue.75
-
-
Blömer, J.1
Seifert, J.P.2
|