-
1
-
-
11244348664
-
Fault attacks on RSA with CRT: Concrete results and practical countermeasures
-
[ABF+02], Burton S. Kaliski, Jr. Çetin Kaya Koç, and Christof Paar, editors, volume 2523 of Lecture Notes in Computer Science, Springer
-
[ABF+02] Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, and Jean-Pierre Seifert. Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Burton S. Kaliski, Jr., Çetin Kaya Koç, and Christof Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science, pages 260-275. Springer, 2002.
-
(2002)
CHES
, pp. 260-275
-
-
Aumüller, C.1
Bier, P.2
Fischer, W.3
Hofreiter, P.4
Seifert, J.-P.5
-
2
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
[BDL97], volume 1233 of LNCS, Springer, May 11-15, Konstanz, Germany. DOI: 10.1007/3- 540-69053-0 4
-
[BDL97] Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In Proceedings of Eurocrypt'97, volume 1233 of LNCS, pages 37-51. Springer, May 11-15 1997. Konstanz, Germany. DOI: 10.1007/3- 540-69053-0 4.
-
(1997)
Proceedings of Eurocrypt'97
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
4
-
-
84887213530
-
Formal verification of an implementation of crt-rsa vigilant's algorithm
-
[CCGV13], DOI: 10.1007/s13389-013-0049-3
-
[CCGV13] Maria Christofi, Boutheina Chetali, Louis Goubin, and David Vigilant. Formal verification of an implementation of CRT-RSA Vigilant's algorithm. Journal of Cryptographic Engineering, 3(3), 2013. DOI: 10.1007/s13389-013-0049-3.
-
(2013)
Journal of Cryptographic Engineering
, vol.3
, Issue.3
-
-
Christofi, M.1
Chetali, B.2
Goubin, L.3
Vigilant, D.4
-
5
-
-
77958107570
-
Fault attacks and countermeasures on vigilant's rsa-crt algorithm
-
[CGM+10], Luca Breveglieri, Marc Joye, Israel Koren, David Naccache, and Ingrid Verbauwhede, editors, IEEE Computer Society
-
[CGM+10] Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, and David Vigilant. Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. In Luca Breveglieri, Marc Joye, Israel Koren, David Naccache, and Ingrid Verbauwhede, editors, FDTC, pages 89-96. IEEE Computer Society, 2010.
-
(2010)
FDTC
, pp. 89-96
-
-
Coron, J.-S.1
Giraud, C.2
Morin, N.3
Piret, G.4
Vigilant, D.5
-
6
-
-
84893935107
-
-
[HMER13], Report 2013/679
-
[HMER13] Karine Heydemann, Nicolas Moro, Emmanuelle Encrenaz, and Bruno Robisson. Formal Verification of a Software Countermeasure Against Instruction Skip Attacks. Cryptology ePrint Archive, Report 2013/679, 2013. http://eprint.iacr.org/.
-
(2013)
Formal Verification of a Software Countermeasure against Instruction Skip Attacks
-
-
Heydemann, K.1
Moro, N.2
Encrenaz, E.3
Robisson, B.4
-
7
-
-
84879904053
-
-
[JT11], Springer LNCS, March,; ISBN 978-3-642-29655-0
-
[JT11] Marc Joye and Michael Tunstall. Fault Analysis in Cryptography. Springer LNCS, March 2011. http://joye.site88.net/FAbook.html.DOI:10.1007/978-3- 642-29656-7; ISBN 978-3-642-29655-0.
-
(2011)
Fault Analysis in Cryptography
-
-
Joye, M.1
Tunstall, M.2
-
8
-
-
84943632039
-
Timing attacks on implementations of diffe- hellman, rsa, dss, and other systems
-
[KJJ96], volume 1109 of LNCS, Springer-Verlag
-
[KJJ96] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Timing Attacks on Implementations of Diffe- Hellman, RSA, DSS, and Other Systems. In Proceed- ings of CRYPTO'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996.
-
(1996)
Proceed- Ings of CRYPTO'96
, pp. 104-113
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
9
-
-
0003683288
-
-
[Koç94], November 1994. Version 2
-
[Koç94] Çetin Kaya Koç. High-Speed RSA Implementation, November 1994. Version 2, ftp://ftp.rsasecurity.com/pub/pdfs/ tr201.pdf.
-
High-Speed RSA Implementation
-
-
Koç, Ç.K.1
-
10
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
[Pai99], Springer, May 2-6 1999. Prague, Czech Republic
-
[Pai99] Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EURO- CRYPT, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer, May 2-6 1999. Prague, Czech Republic.
-
EURO- CRYPT, Volume 1592 of Lecture Notes in Computer Science
, pp. 223-238
-
-
Paillier, P.1
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
RSA78
-
[RSA78] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21(2):120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
51049111850
-
Rsa with crt: A new cost- e-ective solution to thwart fault attacks
-
[Vig08], Elisabeth Oswald and Pankaj Rohatgi, editors, volume 5154 of Lecture Notes in Computer Science, Springer
-
[Vig08] David Vigilant. RSA with CRT: A New Cost- E-ective Solution to Thwart Fault Attacks. In Elisabeth Oswald and Pankaj Rohatgi, editors, CHES, volume 5154 of Lecture Notes in Computer Science, pages 130-145. Springer, 2008.
-
(2008)
CHES
, pp. 130-145
-
-
Vigilant, D.1
-
17
-
-
83455187907
-
Practical optical fault injection on secure microcontrollers
-
[vWWM11], Luca Breveglieri, Sylvain Guilley, Israel Koren, David Naccache, and Junko Takahashi, editors, IEEE
-
[vWWM11] Jasper G. J. van Woudenberg, Marc F. Witteman, and Federico Menarini. Practical Optical Fault Injection on Secure Microcontrollers. In Luca Breveglieri, Sylvain Guilley, Israel Koren, David Naccache, and Junko Takahashi, editors, FDTC, pages 91-99. IEEE, 2011.
-
(2011)
FDTC
, pp. 91-99
-
-
Van Woudenberg, J.G.J.1
Witteman, M.F.2
Menarini, F.3
|