-
3
-
-
35248880671
-
Fault attacks on RSA with CRT: Concrete results and practical countermeasures
-
C. Aum̈uller, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert, "Fault attacks on RSA with CRT: Concrete results and practical countermeasures," in the 4th International Workshop on Cryptographic Hard-ware and Embedded Systems, pp. 260-275, 2002.
-
(2002)
the 4th International Workshop on Cryptographic Hard-ware and Embedded Systems
, pp. 260-275
-
-
Aum̈uller, C.1
Bier, P.2
Fischer, W.3
Hofreiter, P.4
Seifert, J.-P.5
-
4
-
-
3042531980
-
A full RNS implementation of RSA
-
Jun
-
J. C. Bajard and l. Imbert, "A full RNS implementation of RSA," IEEE Transactions on Computers, vol. 53, no. 6, pp. 769-774, Jun. 2004.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 769-774
-
-
Bajard, J.C.1
Imbert, L.2
-
5
-
-
14844326209
-
A new CRT-RSA algorithm secure against bellcore attacks
-
J. Blomer, M. Otto, J. P. Seifert, "A new CRT-RSA algorithm secure against bellcore attacks," in 10th ACM conference on Computer and Communications Security, pp. 311-320, 2003.
-
(2003)
10th ACM conference on Computer and Communications Security
, pp. 311-320
-
-
Blomer, J.1
Otto, M.2
Seifert, J.P.3
-
6
-
-
84957355967
-
On the importance of checking cryptographic protocols for fault
-
Springer-Verlag
-
D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the importance of checking cryptographic protocols for fault," in Eurocrypt'97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
-
(1997)
Eurocrypt'97, LNCS 1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
7
-
-
84894447348
-
Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided?
-
Dec
-
M. Ciet, M. Neve, E. Peeters, and J. J. Quisquater, "Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided?," in Proceedings of the 46th IEEE Midwest Symposium on Circuits and Systems, Dec. 2003.
-
(2003)
Proceedings of the 46th IEEE Midwest Symposium on Circuits and Systems
-
-
Ciet, M.1
Neve, M.2
Peeters, E.3
Quisquater, J.J.4
-
8
-
-
84874955104
-
The sorcerer's apprentice guide to fault attacks
-
June
-
H. B.-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, "The sorcerer's apprentice guide to fault attacks," in Workshop on Fault Detection and Tol-erance in Cryptography, pp. 370-383, June 2004.
-
(2004)
Workshop on Fault Detection and Tol-erance in Cryptography
, pp. 370-383
-
-
-El, H.B.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
9
-
-
0030107358
-
Network security under siege: The timing attack
-
E. English and S. Hamilton, "Network security under siege: The timing attack," IEEE Transaction Com-puter, vol. 29, pp. 95-97, 1996.
-
(1996)
IEEE Transaction Com-puter
, vol.29
, pp. 95-97
-
-
English, E.1
Hamilton, S.2
-
11
-
-
0034428671
-
FPGA implementation of RSA public-key cryptographic coprocessor
-
Sep
-
M. K. Hani, T. S. Lin, and S. H. Nasir, "FPGA implementation of RSA public-key cryptographic coprocessor," in Proceedings on TENCON'00, vol. 3, pp. 6-11, Sep. 2000.
-
(2000)
Proceedings on TENCON'00
, vol.3
, pp. 6-11
-
-
Hani, M.K.1
Lin, T.S.2
Nasir, S.H.3
-
12
-
-
0004794569
-
Chinese remaindering based cryptosystems in the presence of faults
-
M. Joye, A. K. Lenstra, and J.-J. Quisquater, "Chinese remaindering based cryptosystems in the presence of faults," Journal of Cryptology, vol. 12, no. 4, pp. 241-245, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, J.-J.3
-
13
-
-
84943632039
-
Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems
-
Springer-Verlag
-
P. Kocher, "Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems," in Pro-ceedings of Crypto'96, pp. 104-113, Springer-Verlag, 1996.
-
(1996)
Pro-ceedings of Crypto'96
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
84939573910
-
Differential power analysis
-
Aug
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proceedings of Crypto'99, pp. 388-397, Aug. 1999.
-
(1999)
Proceedings of Crypto'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
0003683288
-
-
Technical notes TR 201 RSA Security Inc., Nov
-
C. K. Koc, High-speed RSA Implementations, Technical notes TR 201, RSA Security Inc., Nov. 1994.
-
(1994)
High-speed RSA Implementations
-
-
Koc, C.K.1
-
16
-
-
0003421346
-
-
Technical notes TR 801, RSA Security Inc., Aug
-
C. K. Koc, RSA hardware implementation, Technical notes TR 801, RSA Security Inc., Aug. 1995.
-
(1995)
RSA hardware implementation
-
-
Koc, C.K.1
-
17
-
-
0028482946
-
A systolic, linear-array multiplier for a class of right-shift algorithms
-
Aug
-
P. Kornerup, "A systolic, linear-array multiplier for a class of right-shift algorithms," IEEE Transactions on Computer Arithmetic, vol. 43, pp. 892-898, Aug. 1994.
-
(1994)
IEEE Transactions on Computer Arithmetic
, vol.43
, pp. 892-898
-
-
Kornerup, P.1
-
18
-
-
0141701931
-
An efficient implementation of multi-prime RSA on DSP processor
-
Apr
-
Krishnamurthy, Y. Tang, C. Xu, and Y. Wang, "An efficient implementation of multi-prime RSA on DSP processor," in IEEE International Conference on Acoustics, Speech, & Signal Processing, vol. 2, pp. 413-416, Apr. 2003.
-
(2003)
IEEE International Conference on Acoustics, Speech, & Signal Processing
, vol.2
, pp. 413-416
-
-
Krishnamurthy1
Tang, Y.2
Xu, C.3
Wang, Y.4
-
21
-
-
84966243285
-
Modular multiplication without trial division
-
P. L. Montgomery, "Modular multiplication without trial division," Mathematics of Computation, vol. 44, pp. 519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, pp. 519-521
-
-
Montgomery, P.L.1
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
84874975702
-
-
RSA Laboratories, PKCS 1 v2.0 Amend-ment 1: Multi-Prime RSA, Jul
-
RSA Laboratories, PKCS #1 v2.0 Amend-ment 1: Multi-Prime RSA, Jul. 2000. (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-0a1.pdf)
-
(2000)
-
-
-
25
-
-
47949098691
-
How to check modular exponentiation
-
May
-
A. Shamir, "How to check modular exponentiation," in Proceedings of Eurocrypt'97, pp. 123, May 1997.
-
(1997)
Proceedings of Eurocrypt'97
, pp. 123
-
-
Shamir, A.1
-
26
-
-
0032667653
-
An improved montgomery's algorithm for high-speed RSA public-key cryptosystem
-
June
-
C. Su, S. Hwang, P. Chen, and C. Wu, "An improved montgomery's algorithm for high-speed RSA public-key cryptosystem," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 7, pp 280-284, June 1999.
-
(1999)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.7
, pp. 280-284
-
-
Su, C.1
Hwang, S.2
Chen, P.3
Wu, C.4
-
28
-
-
84949759949
-
RSA cryptosystem design based on the chinese remainder theorem
-
C. H. Wu, J. H. Hong, and C. W. Wu, "RSA cryptosystem design based on the chinese remainder theorem," in Proceedings of the ASP-DAC'01, pp. 391-95, 2001.
-
(2001)
Proceedings of the ASP-DAC'01
, pp. 391-395
-
-
Wu, C.H.1
Hong, J.H.2
Wu, C.W.3
-
29
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
Sep
-
S. M. Yen and M. Joye, "Checking before output may not be enough against fault-based cryptanalysis," IEEE Transactions on Computers, vol.49, no. 9, pp. 967-970, Sep. 2000.
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.M.1
Joye, M.2
-
31
-
-
84949979593
-
A countermeasure against one physical cryptanalysis may benefit another attack
-
Dec
-
S. M. Yen, S. Kim, S. Lim, and S. J. Moon, "A countermeasure against one physical cryptanalysis may benefit another attack," in Proceedings of the 4th In-ternational Conference Seoul on Information Secu-rity and Cryptology, pp. 414-427, Dec. 2001.
-
(2001)
Proceedings of the 4th In-ternational Conference Seoul on Information Secu-rity and Cryptology
, pp. 414-427
-
-
Yen, S.M.1
Kim, S.2
Lim, S.3
Moon, S.J.4
-
32
-
-
84949936541
-
RSA speedup with residue number system immune against hardware fault cryptanalysis
-
Dec
-
S. M. Yen, S. Kim, S. Lim, and S. J. Moon, "RSA speedup with residue number system immune against hardware fault cryptanalysis," in Proceedings of the 4th International Conference Seoul on Information Security and Cryptology, pp. 397-413, Dec. 2001.
-
(2001)
Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
, pp. 397-413
-
-
Yen, S.M.1
Kim, S.2
Lim, S.3
Moon, S.J.4
-
33
-
-
0038374937
-
RSA Speedup with chinese remainder theorem immune against hardware fault cryptanalysis
-
Apr
-
S. M. Yen, S. Kim, S. Lim, and S. J. Moon, "RSA Speedup with chinese remainder theorem immune against hardware fault cryptanalysis," IEEE Trans-actions on computers, vol. 52, pp. 461-472, Apr. 2003.
-
(2003)
IEEE Trans-actions on computers
, vol.52
, pp. 461-472
-
-
Yen, S.M.1
Kim, S.2
Lim, S.3
Moon, S.J.4
-
34
-
-
35248846556
-
Hardware fault attack on RSA with CRT Revisited
-
Springer-Verlag
-
S. M. Yen, S. J. Moon, and J. C. Ha, "Hardware fault attack on RSA with CRT Revisited," in Proceedings of the ICISC'02, LNCS 2587, pp. 374-388, Springer-Verlag, 2003.
-
(2003)
Proceedings of the ICISC'02, LNCS 2587
, pp. 374-388
-
-
Yen, S.M.1
Moon, S.J.2
Ha, J.C.3
-
35
-
-
63449111952
-
Permanent fault attack on RSA with CRT
-
Springer-Verlag
-
S. M. Yen, S. J. Moon, and J. C. Ha, "Permanent fault attack on RSA with CRT," in Proceedings of the ACISP'03, LNCS 2727, pp. 285-296, Springer-Verlag, 2003.
-
(2003)
Proceedings of the ACISP'03, LNCS 2727
, pp. 285-296
-
-
Yen, S.M.1
Moon, S.J.2
Ha, J.C.3
|