-
1
-
-
38549098459
-
Power analysis for secret recovering and reverse engineering of public key algorithms
-
4876 LNCS Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Revised Selected Papers
-
Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 110-125. Springer, Heidelberg (2007) (Pubitemid 351153081)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 110-125
-
-
Amiel, F.1
Feix, B.2
Villegas, K.3
-
2
-
-
35248880671
-
Fault attacks on RSA with CRT: Concrete results and practical countermeasures
-
In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
-
Aum̈uller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 260-275. Springer, Heidelberg (2003)
-
(2003)
CHES 2002. LNCS
, vol.2523
, pp. 260-275
-
-
Aum̈uller, C.1
Bier, P.2
Fischer, W.3
Hofreiter, P.4
Seifert, J.-P.5
-
3
-
-
84956981493
-
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
-
Security Protocols
-
Bao, F., Deng, R., Han, Y., Jeng, A., Narasimhalu, A.D., Ngair, T.-H.: Breaking Public Key Cryptosystems an Tamper Resistance Devices in the Presence of Transient Fault. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 115-124. Springer, Heidelberg (1998) (Pubitemid 128023884)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1361
, pp. 115-124
-
-
Bao, F.1
Deng, R.H.2
Han, Y.F.3
Jeng, A.B.R.4
Narasimhalu, A.D.5
Ngair, T.H.6
-
4
-
-
52949130693
-
(In)security against fault injection attacks for CRT-RSA implementations
-
In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.), Los Alamitos
-
Berzati, A., Canovas, C., Goubin, L.: (In)security Against Fault Injection Attacks for CRT-RSA Implementations. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2008, pp. 101-107. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
FDTC 2008, IEEE Computer Society
, pp. 101-107
-
-
Berzati, A.1
Canovas, C.2
Goubin, L.3
-
5
-
-
51049098141
-
Perturbating RSA public keys: An improved attack
-
In: Oswald, E., Rohatgi, P. (eds.), Springer, Heidelberg
-
Berzati, A., Canovas, C., Goubin, L.: Perturbating RSA public keys: An improved attack. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 380- 395. Springer, Heidelberg (2008)
-
(2008)
CHES 2008. LNCS
, vol.5154
, pp. 380-395
-
-
Berzati, A.1
Canovas, C.2
Goubin, L.3
-
6
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Advances in Cryptology - CRYPTO '97
-
Biham, E., Shamir, A.: differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997) (Pubitemid 127112576)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
7
-
-
14844326209
-
A new RSA-CRT algorithm secure against bellcore attacks
-
In: Jajodia, S., Atluri, V., Jaeger, T. (eds.), ACM Press, New York
-
Bl̈omer, J., Otto, M., Seifert, J.-P.: A New RSA-CRT Algorithm Secure against Bellcore Attacks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) CCS 2003, pp. 311- 320. ACM Press, New York (2003)
-
(2003)
CCS 2003
, pp. 311-320
-
-
Bl̈omer, J.1
Otto, M.2
Seifert, J.-P.3
-
8
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Advances in Cryptology - Eurocrypt '97
-
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997) (Pubitemid 127067792)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
9
-
-
33845191171
-
Attacking right-to-left modular exponentiation with timely random faults
-
4236 LNCSFault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Proceedings
-
Boreale, M.: Attacking right-to-left modular exponentiation with timely random faults. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 24-35. Springer, Heidelberg (2006) (Pubitemid 44850468)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 24-35
-
-
Boreale, M.1
-
10
-
-
37249007426
-
CRT RSA algorithm protected against fault attacks
-
4462 LNCSInformation Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings
-
Boscher, A., Naciri, R., Prou., E.: CRT RSA algorithm protected against fault attacks. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 229-243. Springer, Heidelberg (2007) (Pubitemid 350262663)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 229-243
-
-
Boscher, A.1
Naciri, R.2
Prouff, E.3
-
11
-
-
0000742754
-
Addition chain heuristics
-
In: Brassard, G. (ed.), Springer, Heidelberg
-
Bos, J., Coster, M.: Addition chain heuristics. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 400-407. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1989. LNCS
, vol.435
, pp. 400-407
-
-
Bos, J.1
Coster, M.2
-
12
-
-
33750696616
-
Why one should also secure RSA public key elements
-
4249 LNCSCryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
Brier, É., Chevallier-Mames, B., Ciet, M., Clavier, C.: Why one should also secure RSA public key elements. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 324-338. Springer, Heidelberg (2006) (Pubitemid 44700067)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 324-338
-
-
Brier, E.1
Chevallier-Marnes, B.2
Ciet, M.3
Clavier, C.4
-
13
-
-
3042527150
-
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
-
Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. IEEE Transactions on Computers 53(6), 760-768 (2004)
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 760-768
-
-
Chevallier-Mames, B.1
Ciet, M.2
Joye, M.3
-
14
-
-
33845212887
-
Practical fault countermeasures for chinese remaindering based RSA
-
In: Breveglieri, L., Koren, I. (eds.)
-
Ciet, M., Joye, M.: Practical Fault Countermeasures for Chinese Remaindering Based RSA. In: Breveglieri, L., Koren, I. (eds.) FDTC 2005, pp. 124-132 (2005)
-
(2005)
FDTC 2005
, pp. 124-132
-
-
Ciet, M.1
Joye, M.2
-
15
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
In: Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç .K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
-
(1999)
CHES 1999. LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
16
-
-
67650146631
-
On second-order fault analysis resistance for CRT-RSA implementations
-
Dottax, E., Giraud, C., Rivain, M., Sierra, Y.: On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Cryptology ePrint Archive, Report 2009/24 (2009), http://eprint.iacr.org/2009/024
-
(2009)
Cryptology ePrint Archive, Report 2009/24
-
-
Dottax, E.1
Giraud, C.2
Rivain, M.3
Sierra, Y.4
-
17
-
-
35248881073
-
The doubling attack: Why upwards is better than downwards
-
In: Walter, C.D., Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
-
Fouque, P.-A., Valette, F.: The Doubling Attack: Why Upwards is Better than Downwards. In: Walter, C.D., Koç, Ç .K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
-
(2003)
CHES 2003. LNCS
, vol.2779
, pp. 269-280
-
-
Fouque, P.-A.1
Valette, F.2
-
18
-
-
33747624721
-
An RSA implementation resistant to fault attacks and to simple power analysis
-
DOI 10.1109/TC.2006.135
-
Giraud, C.: An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Transactions on Computers 55(9), 1116-1120 (2006) (Pubitemid 44263810)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1116-1120
-
-
Giraud, C.1
-
19
-
-
0000490812
-
A Survey of Fast Exponentiation Methods
-
Gordon, D.M.: A Survey of Fast Exponentiation Methods. J. Algorithms 27(1), 129-146 (1998) (Pubitemid 128450297)
-
(1998)
Journal of Algorithms
, vol.27
, Issue.1
, pp. 129-146
-
-
Gordon, D.M.1
-
20
-
-
35248898400
-
Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA
-
In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
-
Itoh, K., Izu, T., Takenak, M.: Address-bit differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 129-143. Springer, Heidelberg (2003)
-
(2003)
CHES 2002. LNCS
, vol.2523
, pp. 129-143
-
-
Itoh, K.1
Izu, T.2
Takenak, M.3
-
21
-
-
35248873415
-
A practical countermeasure against address-bit differential power analysis
-
In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.), Springer, Heidelberg
-
Itoh, K., Izu, T., Takenaka, M.: A Practical Countermeasure against Address-Bit differential Power Analysis. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 382-396. Springer, Heidelberg (2003)
-
(2003)
CHES 2003. LNCS
, vol.2779
, pp. 382-396
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
22
-
-
0004794569
-
Chinese remaindering based cryptosystems in the presence of faults
-
Joye, M., Lenstra, A., Quisquater, J.-J.: Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology 12(4), 241-245 (1999)
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.2
Quisquater, J.-J.3
-
23
-
-
37149005270
-
Fault attacks for CRT based RSA:b new attacks, new results, and new countermeasures
-
4462 LNCS Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings
-
Kim, C.H., Quisquater, J.-J.: Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 215-228. Springer, Heidelberg (2007) (Pubitemid 350259652)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 215-228
-
-
Kim, C.H.1
Quisquater, J.-J.2
-
24
-
-
38149140303
-
Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier
-
In: Nam, K.-H., Rhee, G. (eds.), Springer, Heidelberg
-
Kim, C.H., Shin, J.H., Quisquater, J.-J., Lee, P.J.: Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 273-281. Springer, Heidelberg (2007)
-
(2007)
ICISC 2007. LNCS
, vol.4817
, pp. 273-281
-
-
Kim, C.H.1
Shin, J.H.2
Quisquater, J.-J.3
Lee, P.J.4
-
26
-
-
84939573910
-
Differential power analysis
-
In: Wiener, M. (ed.), Springer, Heidelberg
-
Kocher, P., Ja.e, J., Jun, B.: differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Ja.e, J.2
Jun, B.3
-
27
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - CRYPTO '96
-
Kocher, P.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996) (Pubitemid 126106234)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
28
-
-
0029406556
-
Analysis of the sliding window techniques for exponentiation
-
Koç, Ç .: Analysis of the SlidingWindow Techniques for Exponentiation. Computer & Mathematics with applications 30(10), 17-24 (1995)
-
(1995)
Computer & Mathematics with applications
, vol.30
, Issue.10
, pp. 17-24
-
-
Koç, Ç.1
-
29
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
30
-
-
84949514743
-
Power analysis attacks of modular exponentiation in smartcard
-
In: Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
-
Messerges, T., Dabbish, E., Sloan, R.: Power Analysis Attacks of Modular Exponentiation in Smartcard. In: Koç, Ç .K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144-157. Springer, Heidelberg (1999)
-
(1999)
CHES 1999. LNCS
, vol.1717
, pp. 144-157
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
31
-
-
0003863948
-
-
Springer, Heidelberg
-
Mitrinovic, D.S., Sándor, J., Crstici, B.: Handbook of Number Theory. Springer, Heidelberg (1995)
-
(1995)
Handbook of Number Theory.
-
-
Mitrinovic, D.S.1
Sándor, J.2
Crstici, B.3
-
32
-
-
72749106279
-
Algorithms for multi-exponentiation
-
In: Vaudenay, S., Youssef, A.M. (eds.), Springer, Heidelberg
-
M̈oller, B.: Algorithms for multi-exponentiation. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 165-180. Springer, Heidelberg (2001)
-
(2001)
SAC 2001. LNCS
, vol.2259
, pp. 165-180
-
-
M̈oller, B.1
-
33
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
-
DOI 10.1145/359340.359342
-
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978) (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
34
-
-
52949113084
-
A practical fault attack on square and multiply
-
In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.), Los Alamitos
-
Schmidt, J., Herbst, C.: A Practical Fault Attack on Square and Multiply. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2008, pp. 53-58. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
FDTC 2008, IEEE Computer Society
, pp. 53-58
-
-
Schmidt, J.1
Herbst, C.2
-
35
-
-
33745799002
-
On authenticated computing and RSA-based authentication
-
DOI 10.1145/1102120.1102138, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
Seifert, J.-P.: On Authenticated Computing and RSA-based Authentication. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM CCS 2005, pp. 122-127. ACM Press, New York (2005) (Pubitemid 44021996)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 122-127
-
-
Seifert, J.-P.1
-
38
-
-
51049111850
-
RSA with CRT: A new cost-efective solution to thwart fault attacks
-
In: Oswald, E., Rohatgi, P. (eds.), Springer, Heidelberg
-
Vigilant, D.: RSA with CRT: A new cost-efective solution to thwart fault attacks. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 130-145. Springer, Heidelberg (2008)
-
(2008)
CHES 2008. LNCS
, vol.5154
, pp. 130-145
-
-
Vigilant, D.1
-
39
-
-
33747617679
-
Cryptanalysis of a provable secure CRT-RSA algorithm
-
In: P.tzmann, B., Liu, P. (eds.), ACM Press, New York
-
Wagner, D.: Cryptanalysis of a Provable Secure CRT-RSA Algorithm. In: P.tzmann, B., Liu, P. (eds.) CCS 2004, pp. 82-91. ACM Press, New York (2004)
-
(2004)
CCS 2004
, pp. 82-91
-
-
Wagner, D.1
-
40
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
DOI 10.1109/12.869328
-
Yen, S.-M., Joye, M.: Checking Before Output Not Be Enough Against Fault-Based Cryptanalysis. IEEE Transactions on Computers 49(9), 967-970 (2000) (Pubitemid 30959512)
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.-M.1
Joye, M.2
-
41
-
-
84949979593
-
A countermeasure against one physical cryptanalysis may benefit another attack
-
In: Kim, K.-c. (ed.), Springer, Heidelberg
-
Yen, S.-M., Kim, S.-J., Lim, S.-G., Moon, S.-J.: A countermeasure against one physical cryptanalysis may benefit another attack. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 414-427. Springer, Heidelberg (2002)
-
(2002)
ICISC 2001. LNCS
, vol.2288
, pp. 414-427
-
-
Yen, S.-M.1
Kim, S.-J.2
Lim, S.-G.3
Moon, S.-J.4
-
42
-
-
0038374937
-
RSA speedup with residue number system immune against hardware fault cryptanalysis
-
Yen, S.-M., Kim, S.-J., Lim, S.-G., Moon, S.-J.: RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. IEEE Transactions on Computers 52(4), 461-472 (2003)
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.4
, pp. 461-472
-
-
Yen, S.-M.1
Kim, S.-J.2
Lim, S.-G.3
Moon, S.-J.4
|