-
1
-
-
52949137579
-
-
C. Aumüler, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert. Fault Attack on RSA with CRT : Concrete Results and Practical Countermeasures. In B. K. Jr., Ç.K. Koç, and C. Parr, editors, Cryptographic Hardware and Embedded Systems (CHES 2002), 2523 of Lecture Notes in Computer Science, pages 260-275. Springer, 2002.
-
C. Aumüler, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert. Fault Attack on RSA with CRT : Concrete Results and Practical Countermeasures. In B. K. Jr., Ç.K. Koç, and C. Parr, editors, Cryptographic Hardware and Embedded Systems (CHES 2002), volume 2523 of Lecture Notes in Computer Science, pages 260-275. Springer, 2002.
-
-
-
-
2
-
-
33745777234
-
The Sorcerer's Apprentice Guide to Fault Attacks. Cryptology ePrint Archive
-
Report 2004/100
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The Sorcerer's Apprentice Guide to Fault Attacks. Cryptology ePrint Archive, Report 2004/100, 2004.
-
(2004)
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
3
-
-
33845214167
-
Wagner's Attack on a secure CRTRSA Algorithm Reconsidered
-
L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography FDTC 2006, of, Springer-Verlag
-
J. Blömer and M. Otto. Wagner's Attack on a secure CRTRSA Algorithm Reconsidered. In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography (FDTC 2006), volume 4236 of Lecture Notes in Computer Science, pages 13-23. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4236
, pp. 13-23
-
-
Blömer, J.1
Otto, M.2
-
5
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
W. Fumy, editor, EUROCRYPT'97, of, Springer-Verlag
-
D. Boneh, R. DeMillo, and R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In W. Fumy, editor, EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
6
-
-
3042641393
-
On the Importance of Eliminating Errors in Cryptographic Computations
-
D. Boneh, R. DeMillo, and R. Lipton. "On the Importance of Eliminating Errors in Cryptographic Computations". Journal of Cryptology, 14(2):101-119, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
7
-
-
24144434064
-
-
and, editors, Springer-Verlag
-
C. Giraud. DFA on AES. In V. Rijmen, H. Dobbertin, and A. Sowa, editors, Fourth Conference on the Advanced Encryption Standard (AES4), volume 3373 of Lecture Notes in Computer Science, pages 27-41. Springer-Verlag, 2005.
-
(2005)
Fourth Conference on the Advanced Encryption Standard (AES4), volume 3373 of Lecture Notes in Computer Science
, pp. 27-41
-
-
Giraud, C.1
on AES, D.F.A.2
-
8
-
-
52949093349
-
-
C. Giraud. Procédé de traitement de données impliquant une exponentiation modulaire et un dispositif associé, March 2005. Numéro de publication: FR0503083, WO2006103341.
-
C. Giraud. Procédé de traitement de données impliquant une exponentiation modulaire et un dispositif associé, March 2005. Numéro de publication: FR0503083, WO2006103341.
-
-
-
-
10
-
-
33845212887
-
Practical Fault Countermeasures for Chinese Remaindering Based RSA
-
L. Breveglieri and I. Koren, editors
-
M. Joye and M. Ciet. Practical Fault Countermeasures for Chinese Remaindering Based RSA. In L. Breveglieri and I. Koren, editors, Fault Diagnosis and Tolerance in Cryptography (FDTC 2005), pages 124-132, 2005.
-
(2005)
Fault Diagnosis and Tolerance in Cryptography (FDTC 2005)
, pp. 124-132
-
-
Joye, M.1
Ciet, M.2
-
11
-
-
0004794569
-
Chinese Remaindering Based Cryptosystems in the Presence of Faults
-
M. Joye, A. Lenstra, and J.-J. Quisquater. "Chinese Remaindering Based Cryptosystems in the Presence of Faults". Journal of Cryptology, 12(4):241-245, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.2
Quisquater, J.-J.3
-
12
-
-
35248856474
-
Secure Evaluation of Modular Functions
-
R. Hwang and C. Wu, editors, Taipei,Taiwan
-
M. Joye, P. Paillier, and S.-M. Yen. Secure Evaluation of Modular Functions. In R. Hwang and C. Wu, editors, 2001 International Workshop on Cryptology and Network Security, pages 227-229, Taipei,Taiwan, 2001.
-
(2001)
2001 International Workshop on Cryptology and Network Security
, pp. 227-229
-
-
Joye, M.1
Paillier, P.2
Yen, S.-M.3
-
13
-
-
37149005270
-
Fault Attacks for CRT Based RSA : New Attacks, New Results and New Countermeasures
-
Information Security Theory and Practices, Smart Cards, Mobile and Ubiquitus Computing Systems, of, Springer-Verlag
-
C. Kim and J.-J. Quisquater. Fault Attacks for CRT Based RSA : New Attacks, New Results and New Countermeasures. In Information Security Theory and Practices, Smart Cards, Mobile and Ubiquitus Computing Systems, volume 4462 of Lecture Notes in Computer Science, pages 215-228. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4462
, pp. 215-228
-
-
Kim, C.1
Quisquater, J.-J.2
-
14
-
-
0017930809
-
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signature and Public-Key Cryptosystems. In Communications of the ACM, 21, pages 120-126, 1978.
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signature and Public-Key Cryptosystems. In Communications of the ACM, volume 21, pages 120-126, 1978.
-
-
-
-
15
-
-
4243387122
-
Improved Method and Apparatus for Protecting Public Key Schemes from. Timing and Fault Attacks
-
A. Shamir. "Improved Method and Apparatus for Protecting Public Key Schemes from. Timing and Fault Attacks". Presented at the Rump Session of Eurocrypt'97, 1997.
-
(1997)
Presented at the Rump Session of Eurocrypt'97
-
-
Shamir, A.1
-
17
-
-
52949138879
-
-
S.-M. Yen and D. Kim. Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. In Fault Diagnosis and Tolerance in Cryptography (FDTC 2004), pages 381-385, 2004. IEEE Computer Society.
-
S.-M. Yen and D. Kim. Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. In Fault Diagnosis and Tolerance in Cryptography (FDTC 2004), pages 381-385, 2004. IEEE Computer Society.
-
-
-
-
18
-
-
84949936541
-
RSA Speedup with Residue Number System Immune Against Hardware Fault Cryptanalysis
-
K. Kim, editor, Information Security and Cryptology ISISC 2001, of, Springer-Verlag
-
S.-M. Yen, D. Kim, S. Lim, and S. Moon. RSA Speedup with Residue Number System Immune Against Hardware Fault Cryptanalysis. In K. Kim, editor, Information Security and Cryptology (ISISC 2001), volume 2288 of Lecture Notes in Computer Science, pages 397-413. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2288
, pp. 397-413
-
-
Yen, S.-M.1
Kim, D.2
Lim, S.3
Moon, S.4
-
19
-
-
33845216123
-
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
-
L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography FDTC 2006, of, Springer-Verlag
-
S.-M. Yen, D. Kim, and S. Moon. Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography (FDTC 2006), volume 4236 of Lecture Notes in Computer Science, pages 53-61. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4236
, pp. 53-61
-
-
Yen, S.-M.1
Kim, D.2
Moon, S.3
-
20
-
-
35248846556
-
Hardware Fault Attack on RSA with CRT Revisited
-
C. Lim and P. Lee, editors, Information Security and Cryptology ICISC 2002, of, Springer
-
S.-M. Yen, S. Moon, and J.-C. Ha. Hardware Fault Attack on RSA with CRT Revisited. In C. Lim and P. Lee, editors, Information Security and Cryptology (ICISC 2002), volume 2587 of Lecture Notes in Computer Science, pages 374-388. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2587
, pp. 374-388
-
-
Yen, S.-M.1
Moon, S.2
Ha, J.-C.3
|