메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Formal analysis of CRT-RSA Vigilant's countermeasure against the BellCoRe attack: A pledge for formal methods in the field of implementation security

Author keywords

Adleman); BellCoRe (Bell communications research) attack; CRT (Chinese remainder theorem); Fault injection; Formal proof; OCaml; RSA (Rivest; Shamir

Indexed keywords

FORMAL METHODS; NETWORK SECURITY; SIDE CHANNEL ATTACK;

EID: 84893953821     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2556464.2556466     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 1
    • 11244348664 scopus 로고    scopus 로고
    • Fault attacks on RSA with CRT: Concrete results and practical countermeasures
    • [ABF+02], Burton S. Kaliski, Jr. Çetin Kaya Koç, and Christof Paar, editors, volume 2523 of Lecture Notes in Computer Science, Springer
    • [ABF+02] Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, and Jean-Pierre Seifert. Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Burton S. Kaliski, Jr., Çetin Kaya Koç, and Christof Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science, pages 260-275. Springer, 2002.
    • (2002) CHES , pp. 260-275
    • Aumüller, C.1    Bier, P.2    Fischer, W.3    Hofreiter, P.4    Seifert, J.-P.5
  • 2
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • [BDL97], volume 1233 of LNCS, Springer, May 11-15, Konstanz, Germany. DOI: 10.1007/3- 540-69053-0 4
    • [BDL97] Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In Proceedings of Eurocrypt'97, volume 1233 of LNCS, pages 37-51. Springer, May 11-15 1997. Konstanz, Germany. DOI: 10.1007/3- 540-69053-0 4.
    • (1997) Proceedings of Eurocrypt'97 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 4
    • 84887213530 scopus 로고    scopus 로고
    • Formal verification of an implementation of crt-rsa vigilant's algorithm
    • [CCGV13], DOI: 10.1007/s13389-013-0049-3
    • [CCGV13] Maria Christofi, Boutheina Chetali, Louis Goubin, and David Vigilant. Formal verification of an implementation of CRT-RSA Vigilant's algorithm. Journal of Cryptographic Engineering, 3(3), 2013. DOI: 10.1007/s13389-013-0049-3.
    • (2013) Journal of Cryptographic Engineering , vol.3 , Issue.3
    • Christofi, M.1    Chetali, B.2    Goubin, L.3    Vigilant, D.4
  • 5
    • 77958107570 scopus 로고    scopus 로고
    • Fault attacks and countermeasures on vigilant's rsa-crt algorithm
    • [CGM+10], Luca Breveglieri, Marc Joye, Israel Koren, David Naccache, and Ingrid Verbauwhede, editors, IEEE Computer Society
    • [CGM+10] Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, and David Vigilant. Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. In Luca Breveglieri, Marc Joye, Israel Koren, David Naccache, and Ingrid Verbauwhede, editors, FDTC, pages 89-96. IEEE Computer Society, 2010.
    • (2010) FDTC , pp. 89-96
    • Coron, J.-S.1    Giraud, C.2    Morin, N.3    Piret, G.4    Vigilant, D.5
  • 7
    • 84879904053 scopus 로고    scopus 로고
    • [JT11], Springer LNCS, March,; ISBN 978-3-642-29655-0
    • [JT11] Marc Joye and Michael Tunstall. Fault Analysis in Cryptography. Springer LNCS, March 2011. http://joye.site88.net/FAbook.html.DOI:10.1007/978-3- 642-29656-7; ISBN 978-3-642-29655-0.
    • (2011) Fault Analysis in Cryptography
    • Joye, M.1    Tunstall, M.2
  • 8
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffe- hellman, rsa, dss, and other systems
    • [KJJ96], volume 1109 of LNCS, Springer-Verlag
    • [KJJ96] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Timing Attacks on Implementations of Diffe- Hellman, RSA, DSS, and Other Systems. In Proceed- ings of CRYPTO'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996.
    • (1996) Proceed- Ings of CRYPTO'96 , pp. 104-113
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 9
    • 0003683288 scopus 로고    scopus 로고
    • [Koç94], November 1994. Version 2
    • [Koç94] Çetin Kaya Koç. High-Speed RSA Implementation, November 1994. Version 2, ftp://ftp.rsasecurity.com/pub/pdfs/ tr201.pdf.
    • High-Speed RSA Implementation
    • Koç, Ç.K.1
  • 10
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • [Pai99], Springer, May 2-6 1999. Prague, Czech Republic
    • [Pai99] Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EURO- CRYPT, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer, May 2-6 1999. Prague, Czech Republic.
    • EURO- CRYPT, Volume 1592 of Lecture Notes in Computer Science , pp. 223-238
    • Paillier, P.1
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RSA78
    • [RSA78] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21(2):120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 15
    • 51049111850 scopus 로고    scopus 로고
    • Rsa with crt: A new cost- e-ective solution to thwart fault attacks
    • [Vig08], Elisabeth Oswald and Pankaj Rohatgi, editors, volume 5154 of Lecture Notes in Computer Science, Springer
    • [Vig08] David Vigilant. RSA with CRT: A New Cost- E-ective Solution to Thwart Fault Attacks. In Elisabeth Oswald and Pankaj Rohatgi, editors, CHES, volume 5154 of Lecture Notes in Computer Science, pages 130-145. Springer, 2008.
    • (2008) CHES , pp. 130-145
    • Vigilant, D.1
  • 17
    • 83455187907 scopus 로고    scopus 로고
    • Practical optical fault injection on secure microcontrollers
    • [vWWM11], Luca Breveglieri, Sylvain Guilley, Israel Koren, David Naccache, and Junko Takahashi, editors, IEEE
    • [vWWM11] Jasper G. J. van Woudenberg, Marc F. Witteman, and Federico Menarini. Practical Optical Fault Injection on Secure Microcontrollers. In Luca Breveglieri, Sylvain Guilley, Israel Koren, David Naccache, and Junko Takahashi, editors, FDTC, pages 91-99. IEEE, 2011.
    • (2011) FDTC , pp. 91-99
    • Van Woudenberg, J.G.J.1    Witteman, M.F.2    Menarini, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.