E-Books durchsuchen
Fault Diagnosis and Tolerance in Cryptography [2006]
- 1
-
Is It Wise to Publish Your Public RSA Keys?
- 13
-
Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered
- 24
-
Attacking Right-to-Left Modular Exponentiation with Timely Random Faults
- 36
-
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
- 53
-
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
- 62
-
Blinded Fault Resistant Exponentiation
- 71
-
Incorporating Error Detection in an RSA Architecture
- 80
-
Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation
- 88
-
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
- 98
-
A Fault Attack Against the FOX Cipher Family
- 106
-
Fault Based Collision Attacks on AES
- 121
-
An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers
- 131
-
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices
- 144
-
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
- 159
-
A Comparative Cost/Security Analysis of Fault Attack Countermeasures
- 173
-
Non-linear Residue Codes for Robust Public-Key Arithmetic
- 185
-
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
- 196
-
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
- 211
-
DPA on Faulty Cryptographic Hardware and Countermeasures
- 223
-
Fault Analysis of DPA-Resistant Algorithms
- 237
-
Java Type Confusion and Fault Attacks