-
1
-
-
35248880671
-
Fault attacks on RSA with CRT: concrete results and practical countermeasures
-
In: Kaliski, B. S., Jr., Koç, C. K., Paar, C. (eds.), Springer, Berlin
-
Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Kaliski, B. S., Jr., Koç, C. K., Paar, C. (eds.) CHES. Lecture Notes in Computer Science, vol. 2523, pp. 260-275. Springer, Berlin (2002).
-
(2002)
CHES. Lecture Notes in Computer Science
, vol.2523
, pp. 260-275
-
-
Aumüller, C.1
Bier, P.2
Fischer, W.3
Hofreiter, P.4
Seifert, J.-P.5
-
2
-
-
84906229243
-
A survey of differential fault analysis against classical RSA implementations
-
In: Joye, M., Tunstall, M. (eds.), Springer, Berlin
-
Berzati, A., Canovas-Dumas, C., Goubin, L.: A survey of differential fault analysis against classical RSA implementations. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography, Information Security and Cryptography, pp. 111-124. Springer, Berlin (2012).
-
(2012)
Fault Analysis in Cryptography, Information Security and Cryptography
, pp. 111-124
-
-
Berzati, A.1
Canovas-Dumas, C.2
Goubin, L.3
-
3
-
-
51849097235
-
Bug attacks
-
Springer, Santa Barbara
-
Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. In: CRYPTO. LNCS, vol. 5157, pp. 221-240. Springer, Santa Barbara (2008).
-
(2008)
CRYPTO. LNCS
, vol.5157
, pp. 221-240
-
-
Biham, E.1
Carmeli, Y.2
Shamir, A.3
-
4
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Springer, Konstanz, doi: 10. 1007/3-540-69053-0_4
-
Boneh, D., DeMillo, R. A., Lipton, R. J.: On the importance of checking cryptographic protocols for faults. In: Proceedings of Eurocrypt'97. LNCS, vol. 1233, pp. 37-51. Springer, Konstanz (1997). doi: 10. 1007/3-540-69053-0_4.
-
(1997)
Proceedings of Eurocrypt'97. LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
6
-
-
14844326209
-
A new CRT-RSA algorithm secure against Bellcore attacks
-
In: Jajodia, S., Atluri, V., Jaeger, T. (eds.), ACM
-
Blömer, J., Otto, M., Seifert, J. P.: A new CRT-RSA algorithm secure against Bellcore attacks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) ACM Conference on Computer and Communications Security, pp. 311-320. ACM (2003).
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 311-320
-
-
Blömer, J.1
Otto, M.2
Seifert, J.P.3
-
7
-
-
84958641478
-
Analysis, differential fault, of secret key cryptosystems
-
Springer, Santa Barbara, doi: 10. 1007/BFb0052259
-
Biham, E., Shamir, A.: Analysis, differential fault, of secret key cryptosystems. In: CRYPTO. LNCS, vol. 1294, pp. 513-525. Springer, Santa Barbara (1997). doi: 10. 1007/BFb0052259.
-
(1997)
CRYPTO. LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
8
-
-
84887213530
-
Formal verification of an implementation of CRT-RSA Vigilant's algorithm
-
doi: 10. 1007/s13389-013-0049-3
-
Christofi, M., Chetali, B., Goubin, L., Vigilant, D.: Formal verification of an implementation of CRT-RSA Vigilant's algorithm. J. Cryptogr. Eng. 3(3), (2013). doi: 10. 1007/s13389-013-0049-3.
-
(2013)
J. Cryptogr. Eng.
, vol.3
, Issue.3
-
-
Christofi, M.1
Chetali, B.2
Goubin, L.3
Vigilant, D.4
-
9
-
-
77958107570
-
Fault attacks and countermeasures on vigilant's RSA-CRT Algorithm
-
In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.),. IEEE Computer Society
-
Coron, J.-S., Giraud, C., Morin, N., Piret, G., Vigilant, D.: Fault attacks and countermeasures on vigilant's RSA-CRT Algorithm. In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.) FDTC, pp. 89-96. IEEE Computer Society (2010).
-
(2010)
FDTC
, pp. 89-96
-
-
Coron, J.-S.1
Giraud, C.2
Morin, N.3
Piret, G.4
Vigilant, D.5
-
10
-
-
84875579662
-
Wavelet transform based pre-processing for side channel analysis
-
IEEE, Vancouver, doi: 10. 1109/MICROW. 2012. 15
-
Debande, N., Souissi, Y., Elaabid, M. A., Guilley, S., Danger, J.-L.: Wavelet transform based pre-processing for side channel analysis. In: HASP, pp. 32-38. IEEE, Vancouver (2012). doi: 10. 1109/MICROW. 2012. 15.
-
(2012)
HASP
, pp. 32-38
-
-
Debande, N.1
Souissi, Y.2
Elaabid, M.A.3
Guilley, S.4
Danger, J.-L.5
-
11
-
-
0001421451
-
Number systems and arithmetic
-
Garner, H. L.: Number systems and arithmetic. Adv. Comput. 6, 131-194 (1965).
-
(1965)
Adv. Comput.
, vol.6
, pp. 131-194
-
-
Garner, H.L.1
-
12
-
-
84881516126
-
Provably secure concurrent error detection against differential fault analysis
-
Report 2012/552
-
Guo, X., Mukhopadhyay, D., Karri, R.: Provably secure concurrent error detection against differential fault analysis. Cryptology ePrint Archive, Report 2012/552. 2012. http://eprint. iacr. org/2012/552/.
-
(2012)
Cryptology ePrint Archive
-
-
Guo, X.1
Mukhopadhyay, D.2
Karri, R.3
-
14
-
-
0004794569
-
Chinese remaindering based cryptosystems in the presence of faults
-
Joye, M., Lenstra, A. K., Quisquater, J.-J.: Chinese remaindering based cryptosystems in the presence of faults. J. Cryptol. 12(4), 241-245 (1999).
-
(1999)
J. Cryptol.
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, J.-J.3
-
15
-
-
77950971337
-
Protecting RSA against fault attacks: the embedding method
-
In: Breveglieri, L., Koren, I., Naccache, D., Oswald, E., Seifert, J.-P. (eds.), IEEE Computer Society
-
Joye, M.: Protecting RSA against fault attacks: the embedding method. In: Breveglieri, L., Koren, I., Naccache, D., Oswald, E., Seifert, J.-P. (eds.) FDTC, pp. 41-45. IEEE Computer Society (2009).
-
(2009)
FDTC
, pp. 41-45
-
-
Joye, M.1
-
16
-
-
35048825596
-
GCD-free algorithms for computing modular inverses
-
In: Walter, C. D., Koç, C. K., Paar, C. (eds.), Springer, Berlin
-
Joye, M., Paillier, P.: GCD-free algorithms for computing modular inverses. In: Walter, C. D., Koç, C. K., Paar, C. (eds.) CHES. Lecture Notes in Computer Science, vol. 2779, pp. 243-253. Springer, Berlin (2003).
-
(2003)
CHES. Lecture Notes in Computer Science
, vol.2779
, pp. 243-253
-
-
Joye, M.1
Paillier, P.2
-
17
-
-
84939573910
-
Differential power analysis
-
Springer, Berlin
-
Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of CRYPTO'99. LNCS, vol. 1666, pp. 388-397. Springer, Berlin (1999).
-
(1999)
Proceedings of CRYPTO'99. LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
18
-
-
79960840652
-
An efficient CRT-RSA algorithm secure against power and fault attacks
-
(October)
-
Kim, S.-K., Kim, T. H., Han, D.-G., Hong, S.: An efficient CRT-RSA algorithm secure against power and fault attacks. J. Syst. Softw. 84, 1660-1669 (October 2011).
-
(2011)
J. Syst. Softw.
, vol.84
, pp. 1660-1669
-
-
Kim, S.-K.1
Kim, T.H.2
Han, D.-G.3
Hong, S.4
-
19
-
-
0003683288
-
-
November, Version 2
-
Koç, C. K.: High-speed RSA implementation, November 1994. Version 2. ftp://ftp. rsasecurity. com/pub/pdfs/tr201. pdf.
-
(1994)
High-speed RSA implementation
-
-
Koç, C.K.1
-
20
-
-
84893953821
-
Formal analysis of CRT-RSA vigilant's countermeasure against the BellCoRe attack-a pledge for formal methods in the field of implementation security
-
ISBN: 978-1-4503-2649-0
-
Rauzy, P., Guilley, S.: Formal analysis of CRT-RSA vigilant's countermeasure against the BellCoRe attack-a pledge for formal methods in the field of implementation security. In: 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 2014) (2014). ISBN: 978-1-4503-2649-0.
-
(2014)
3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 2014)
-
-
Rauzy, P.1
Guilley, S.2
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978).
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
22
-
-
84906233620
-
-
Non-Invasive Attack Testing Workshop (NIAT 2011), co-organized by NIST & AIST. Todai-ji Cultural Center, Nara, Japan
-
Souissi, Y., Elaabid, M. A., Danger, J.-L., Guilley, S., Debande, N.: Novel applications of wavelet transforms based side-channel analysis, 26-27 September 2011. Non-Invasive Attack Testing Workshop (NIAT 2011), co-organized by NIST & AIST. Todai-ji Cultural Center, Nara, Japan. (http://csrc. nist. gov/news_events/non-invasive-attack-testing-workshop/papers/01_Souissi. pdf).
-
Novel applications of wavelet transforms based side-channel analysis, 26-27 September 2011
-
-
Souissi, Y.1
Elaabid, M.A.2
Danger, J.-L.3
Guilley, S.4
Debande, N.5
-
25
-
-
51049111850
-
RSA with CRT: a new cost-effective solution to thwart fault attacks
-
In Oswald, E., Rohatgi, P. (eds.), Springer, Berlin
-
Vigilant, D.: RSA with CRT: a new cost-effective solution to thwart fault attacks. In Oswald, E., Rohatgi, P. (eds.) CHES. Lecture Notes in Computer Science, vol. 5154, pp. 130-145. Springer, Berlin (2008).
-
(2008)
CHES. Lecture Notes in Computer Science
, vol.5154
, pp. 130-145
-
-
Vigilant, D.1
|