메뉴 건너뛰기




Volumn 2271, Issue , 2002, Pages 17-29

Observability analysis – Detecting when improved cryptosystems fail

Author keywords

Cryptanalysis; Cryptosystems; Fault analysis; Implementations; Observability; Robustness; Security analysis; Side channel attacks

Indexed keywords

CRYPTOGRAPHY; OBSERVABILITY; ROBUSTNESS (CONTROL SYSTEMS);

EID: 84944881697     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45760-7_2     Document Type: Conference Paper
Times cited : (26)

References (32)
  • 1
    • 0003751190 scopus 로고    scopus 로고
    • October 1, Available at
    • RSA Laboratories. PKCS #1 v2.0: RSA cryptography standard, October 1, 1998. Available at http://www.rsasecurity.com/rsalabs/pkcs/.
    • (1998) PKCS #1 V2.0: RSA Cryptography Standard
  • 2
    • 84944931653 scopus 로고    scopus 로고
    • Draft 2, 5, Available at
    • RSA Laboratories. PKCS #1 v2.1: RSA cryptography standard, Draft 2, January 5, 2001. Available at http://www.rsasecurity.com/rsalabs/pkcs/.
    • (2001) PKCS #1 V2.1: RSA Cryptography Standard , Issue.January
  • 3
    • 84956981493 scopus 로고    scopus 로고
    • Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
    • B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds, Springer-Verlag
    • F. Bao, R. Deng, Y. Han, A. Jeng, A. D. Narasimhalu, and T.-H. Ngair. Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds, Security Protocols, vol. 1361 of Lecture Notes in Computer Science, pp. 115–124, Springer-Verlag, 1998.
    • (1998) Security Protocols, Vol. 1361 of Lecture Notes in Computer Science , pp. 115-124
    • Bao, F.1    Deng, R.2    Han, Y.3    Jeng, A.4    Narasimhalu, A.D.5    Ngair, T.-H.6
  • 5
  • 7
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • Dan Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2):203–213, 1999.
    • (1999) Notices of the AMS , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 10
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • Don Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10(4):233–260, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 11
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimum cost
    • H. Imai and Y. Zheng, Springer-Verlag
    • Eiichiro Fujisaki and Tatsuaki Okamoto. How to enhance the security of public-key encryption at minimum cost. In H. Imai and Y. Zheng, eds., Public Key Cryptography, vol. 1560 of Lecture Notes in Computer Science, pp. 53–68, Springer-Verlag, 1999.
    • (1999) Public Key Cryptography, Vol. 1560 of Lecture Notes in Computer Science , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 15
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering cryptosystems in the presence of faults
    • Marc Joye, Arjen K. Lenstra, and Jean-Jacques Quisquater. Chinese remaindering cryptosystems in the presence of faults. Journal of Cryptology, 12(4):241-245, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 20
    • 0003421346 scopus 로고    scopus 로고
    • Technical Report TR 801, RSA Laboratories, April
    • Çetin K. Koç. RSA hardware implementation. Technical Report TR 801, RSA Laboratories, April 1996.
    • (1996) RSA Hardware Implementation
    • Koç, Ç.K.1
  • 22
    • 33846862428 scopus 로고    scopus 로고
    • A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1
    • J. Kilian, ed, Springer-Verlag
    • James Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1. In J. Kilian, ed., Advances in Cryptology – CRYPTO2001, vol. 2139 of Lecture Notes in Computer Science, pp. 230–238, Springer-Verlag, 2001.
    • (2001) Advances in Cryptology – CRYPTO2001, Vol. 2139 of Lecture Notes in Computer Science , pp. 230-238
    • Manger, J.1
  • 24
    • 0041312251 scopus 로고
    • The future of integer factorization
    • Andrew Odlyzko. The future of integer factorization. Cryptobytes, 1(2):5–12, 1995.
    • (1995) Cryptobytes , vol.1 , Issue.2 , pp. 5-12
    • Odlyzko, A.1
  • 25
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • Jean-Jacques Quisquater and Chantal Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters, 18:905–907, 1982.
    • (1982) Electronics Letters , vol.18 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 28
    • 0008631959 scopus 로고
    • RSA for paranoids
    • Adi Shamir. RSA for paranoids. Cryptobytes, 1(2):1–4, 1995.
    • (1995) Cryptobytes , vol.1 , Issue.2 , pp. 1-4
    • Shamir, A.1
  • 32
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • Sung-Ming Yen and Marc Joye. Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers, 49(9):967–970, 2000.
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.-M.1    Joye, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.