메뉴 건너뛰기




Volumn 7178 LNCS, Issue , 2012, Pages 171-186

Practical realisation and elimination of an ECC-related software bug attack

Author keywords

bug attack; Elliptic curve; fault attack; NIST; OpenSSL

Indexed keywords

BUG ATTACK; ELLIPTIC CURVE; FAULT ATTACK; NIST; OPEN SSL;

EID: 84857727360     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-27954-6_11     Document Type: Conference Paper
Times cited : (28)

References (19)
  • 1
    • 35048856922 scopus 로고    scopus 로고
    • Validation of Elliptic Curve Public Keys
    • Public Key Cryptography - PKC 2003
    • Antipa, A., Brown, D.R.L., Menezes, A., Struik, R., Vanstone, S.A.: Validation of Elliptic Curve Public Keys. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 211-223. Springer, Heidelberg (2002) (Pubitemid 36137139)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2567 , pp. 211-223
    • Antipa, A.1    Brown, D.2    Menezes, A.3    Struik, R.4    Vanstone, S.5
  • 3
    • 64249159739 scopus 로고    scopus 로고
    • Constructive and destructive use of compilers in elliptic curve cryptography
    • Barbosa, M., Moss, A., Page, D.: Constructive and destructive use of compilers in elliptic curve cryptography. J. Cryptology 22(2), 259-281 (2009)
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 259-281
    • Barbosa, M.1    Moss, A.2    Page, D.3
  • 4
    • 51849097235 scopus 로고    scopus 로고
    • Bug Attacks
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Biham, E., Carmeli, Y., Shamir, A.: Bug Attacks. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 221-240. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 221-240
    • Biham, E.1    Carmeli, Y.2    Shamir, A.3
  • 5
    • 18744405402 scopus 로고    scopus 로고
    • Elliptic curve cryptosystems in the presence of permanent and transient faults
    • Ciet, M., Joye, M.: Elliptic curve cryptosystems in the presence of permanent and transient faults. Designs, Codes and Cryptography 36(1), 33-43 (2005)
    • (2005) Designs, Codes and Cryptography , vol.36 , Issue.1 , pp. 33-43
    • Ciet, M.1    Joye, M.2
  • 7
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
    • Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 8
    • 24944448541 scopus 로고    scopus 로고
    • Simplify: A theorem prover for program checking
    • Detlefs, D., Nelson, G., Saxe, J.B.: Simplify: a theorem prover for program checking. J. ACM 52(3), 365-473 (2005)
    • (2005) J. ACM , vol.52 , Issue.3 , pp. 365-473
    • Detlefs, D.1    Nelson, G.2    Saxe, J.B.3
  • 9
    • 35048862900 scopus 로고    scopus 로고
    • Multi-Prover Verification of C Programs
    • Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. Springer, Heidelberg
    • Filliâtre, J.-C., Marché, C.: Multi-Prover Verification of C Programs. In: Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. LNCS, vol. 3308, pp. 15-29. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3308 , pp. 15-29
    • Filliâtre, J.-C.1    Marché, C.2
  • 10
    • 36049022245 scopus 로고    scopus 로고
    • The Why/Krakatoa/Caduceus Platform for Deductive Program Verification
    • Damm, W., Hermanns, H. (eds.) CAV 2007. Springer, Heidelberg
    • Filliâtre, J.-C., Marché, C.: The Why/Krakatoa/Caduceus Platform for Deductive Program Verification. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 173-177. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4590 , pp. 173-177
    • Filliâtre, J.-C.1    Marché, C.2
  • 11
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • Herley, C.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: New Security Paradigms Workshop (NSPW), pp. 133-144 (2009)
    • (2009) New Security Paradigms Workshop (NSPW) , pp. 133-144
    • Herley, C.1
  • 12
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • Hoare, C.A.R.: An axiomatic basis for computer programming. Communications of the ACM 12, 576-580 (1969)
    • (1969) Communications of the ACM , vol.12 , pp. 576-580
    • Hoare, C.A.R.1
  • 13
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comp. 48(177), 243-264 (1987)
    • (1987) Math. Comp. , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 14
    • 35048881103 scopus 로고    scopus 로고
    • Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Nguyen, P.Q.: Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 555-570. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 555-570
    • Nguyen, P.Q.1
  • 17
    • 0012584245 scopus 로고    scopus 로고
    • Technical Report CORR 99-39, Centre for Applied Cryptographic Research (CACR)
    • Solinas, J.A.: Generalized Mersenne numbers. Technical Report CORR 99-39, Centre for Applied Cryptographic Research (CACR), University of Waterloo (1999), http://www.cacr.math.uwaterloo.ca/techreports/1999/corr99-39.pdf
    • (1999) Generalized Mersenne Numbers
    • Solinas, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.