-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystem”, Commun. of ACM, vol. 21, no. 2, pp. 120–126, 1978.
-
(1978)
Commun. Of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469–472, 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
5
-
-
84949939182
-
-
New threat model breaks crypto codesSept
-
Bellcore Press Release, “New threat model breaks crypto codes”, Sept. 1996, available at URL .
-
(1996)
-
-
-
6
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Springer-Verlag
-
D. Boneh, R.A. DeMillo, and R.J. Lipton, “On the importance of checking cryptographic protocols for faults”, In Advances in Cryptology–EUROCRYPT’97, LNCS 1233, pp. 37–51, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology–EUROCRYPT’97, LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
7
-
-
0040320732
-
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
-
Paris, France
-
F. Bao, R.H. Deng, Y. Han, A. Jeng, A.D. Narasimbalu, and T. Ngair, “Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults”, In Pre-proceedings of the 1997 Security Protocols Workshop, Paris, France, 1997.
-
(1997)
Pre-Proceedings of the 1997 Security Protocols Workshop
-
-
Bao, F.1
Deng, R.H.2
Han, Y.3
Jeng, A.4
Narasimbalu, A.D.5
Ngair, T.6
-
8
-
-
33749904500
-
Breaking real-world implementations of cryptosystems by manipulating their random number generation
-
Fukuoka, Japan, 29th January–1st February 1997. An earlier version was presented at the rump session of ASIACRYPT’96
-
Y. Zheng and T. Matsumoto, “Breaking real-world implementations of cryptosystems by manipulating their random number generation”, In Pre-proceedings of the 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, 29th January–1st February 1997. An earlier version was presented at the rump session of ASIACRYPT’96.
-
Pre-Proceedings of the 1997 Symposium on Cryptography and Information Security
-
-
Zheng, Y.1
Matsumoto, T.2
-
9
-
-
0038214614
-
Chinks in digital armor–Exploiting faults to break smart-card cryptosystems
-
I. Peterson, “Chinks in digital armor–Exploiting faults to break smart-card cryptosystems”, Science News, vol. 151, no. 5, pp. 78–79, 1997.
-
(1997)
Science News
, vol.151
, Issue.5
, pp. 78-79
-
-
Peterson, I.1
-
10
-
-
84949230268
-
RSA-type signatures in the presence of transient faults
-
Springer-Verlag
-
M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng, “RSA-type signatures in the presence of transient faults”, In Cryptography and Coding, LNCS 1355, pp. 155–160, Springer-Verlag, 1997.
-
(1997)
Cryptography and Coding, LNCS
, vol.1355
, pp. 155-160
-
-
Joye, M.1
Quisquater, J.-J.2
Bao, F.3
Deng, R.H.4
-
11
-
-
84948990454
-
Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective
-
Springer-Verlag, Berlin
-
D.P. Maher, “Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective”, In Financial Cryptography, LNCS 1318, pp. 109–121, Springer-Verlag, Berlin, 1997.
-
(1997)
Financial Cryptography, LNCS
, vol.1318
, pp. 109-121
-
-
Maher, D.P.1
-
12
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Springer-Verlag, Berlin
-
E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems”, In Advances in Cryptology–CRYPTO’97, LNCS 1294, pp. 513–525, Springer-Verlag, Berlin, 1997.
-
(1997)
Advances in Cryptology–CRYPTO’97, LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
14
-
-
0004794569
-
Chinese remaindering based cryptosystems in the presence of faults
-
M. Joye, A.K. Lenstra, and J.-J. Quisquater, “Chinese remaindering based cryptosystems in the presence of faults”, Journal of Cryptology, vol. 12, no. 4, pp. 241-245, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, J.-J.3
-
15
-
-
84934276722
-
-
Tech. Report CG-1997/1, UCL Crypto Group, Louvain-la-Neuve, March
-
M. Joye, F. Koeune, and J.-J. Quisquater, “Further results on Chinese remaindering”, Tech. Report CG-1997/1, UCL Crypto Group, Louvain-la-Neuve, March 1997.
-
(1997)
Further Results on Chinese Remaindering
-
-
Joye, M.1
Koeune, F.2
Quisquater, J.-J.3
-
16
-
-
84949962720
-
-
presented at the rump session of EUROCRYPT’97, Konstanz, Germany, 11–15th May
-
A. Shamir, “How to check modular exponentiation”, presented at the rump session of EUROCRYPT’97, Konstanz, Germany, 11–15th Ma y1997.
-
(1997)
How to Check Modular Exponentiation
-
-
Shamir, A.1
-
18
-
-
0034276289
-
Checking before output may not be enough against faultbased cryptanalysis
-
Sept
-
S.M. Yen and M. Joye, “Checking before output may not be enough against faultbased cryptanalysis”, IEEE Trans. on Computers, vol. 49, no. 9, pp. 967–970, Sept. 2000.
-
(2000)
IEEE Trans. On Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.M.1
Joye, M.2
-
20
-
-
0020194569
-
Fast decipherment algorithm for RSA publickey cryptosystem
-
J.-J. Quisquater and C. Couvreur, “Fast decipherment algorithm for RSA publickey cryptosystem”, Electronics Letters, vol. 18, no. 21, pp. 905–907, 1982.
-
(1982)
Electronics Letters
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
-
22
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Springer-Verlag
-
P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems”, In Advances in Cryptology–CRYPTO’96, LNCS 1109, pp. 104–113, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology–CRYPTO’96, LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
23
-
-
18744414026
-
Comments on some new attacks on cryptographic devices
-
July
-
B.S. Kaliski Jr. and M.J.B. Robshaw, “Comments on some new attacks on cryptographic devices”, RSA Laboratories Bulletin, no. 5, July 1997.
-
(1997)
RSA Laboratories Bulletin
, Issue.5
-
-
Kaliski, B.S.1
Robshaw, M.2
-
24
-
-
68549092451
-
A timing attack against RSA with the Chinese Remainder Theorem
-
Springer-Verlag
-
W. Schindler, “A timing attack against RSA with the Chinese Remainder Theorem”, In Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS 1965, pp. 109–124, Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS
, vol.1965
, pp. 109-124
-
-
Schindler, W.1
-
25
-
-
0033204468
-
Montgomery’s exponentiation needs no final subtractions
-
C.D. Walter, “Montgomery’s exponentiation needs no final subtractions”, Electronics Letters, vol. 35, no. 21, pp. 1831–1832, 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Walter, C.D.1
-
26
-
-
68549090587
-
Montgomery exponentiation with no final subtractions: Improved results
-
Springer-Verlag
-
C. Hachez and J.-J. Quisquater, “Montgomery exponentiation with no final subtractions: Improved results”, In Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS 1965, pp. 293–301, Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS
, vol.1965
, pp. 293-301
-
-
Hachez, C.1
Quisquater, J.-J.2
|