Workshop on Fault Diagnosis and Tolerance in Cryptography最新文献

筛选
英文 中文
Blinded Fault Resistant Exponentiation 盲法抗故障幂
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_6
Guillaume Fumaroli, David Vigilant
{"title":"Blinded Fault Resistant Exponentiation","authors":"Guillaume Fumaroli, David Vigilant","doi":"10.1007/11889700_6","DOIUrl":"https://doi.org/10.1007/11889700_6","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection 具有统一错误检测的抗故障攻击加密硬件
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_17
Konrad J. Kulikowski, M. Karpovsky, A. Taubin
{"title":"Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection","authors":"Konrad J. Kulikowski, M. Karpovsky, A. Taubin","doi":"10.1007/11889700_17","DOIUrl":"https://doi.org/10.1007/11889700_17","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114928416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Incorporating Error Detection in an RSA Architecture 在RSA体系结构中加入错误检测
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_7
L. Breveglieri, I. Koren, P. Maistri, M. Ravasio
{"title":"Incorporating Error Detection in an RSA Architecture","authors":"L. Breveglieri, I. Koren, P. Maistri, M. Ravasio","doi":"10.1007/11889700_7","DOIUrl":"https://doi.org/10.1007/11889700_7","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fault Analysis of DPA-Resistant Algorithms 抗dpa算法故障分析
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_20
F. Amiel, Christophe Clavier, Michael Tunstall
{"title":"Fault Analysis of DPA-Resistant Algorithms","authors":"F. Amiel, Christophe Clavier, Michael Tunstall","doi":"10.1007/11889700_20","DOIUrl":"https://doi.org/10.1007/11889700_20","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127139574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Non-linear Residue Codes for Robust Public-Key Arithmetic 鲁棒公钥算法的非线性剩余码
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_16
G. Gaubatz, B. Sunar, M. Karpovsky
{"title":"Non-linear Residue Codes for Robust Public-Key Arithmetic","authors":"G. Gaubatz, B. Sunar, M. Karpovsky","doi":"10.1007/11889700_16","DOIUrl":"https://doi.org/10.1007/11889700_16","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127389152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection 基于故障感染的两种带CRT的RSA协议密码分析
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_5
Sung-Ming Yen, Dongryeol Kim, S. Moon
{"title":"Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection","authors":"Sung-Ming Yen, Dongryeol Kim, S. Moon","doi":"10.1007/11889700_5","DOIUrl":"https://doi.org/10.1007/11889700_5","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130511692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices 低成本加密设备故障分析的对抗模型
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_13
Kerstin Lemke-Rust, C. Paar
{"title":"An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices","authors":"Kerstin Lemke-Rust, C. Paar","doi":"10.1007/11889700_13","DOIUrl":"https://doi.org/10.1007/11889700_13","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Comparative Cost/Security Analysis of Fault Attack Countermeasures 故障攻击对策的成本/安全比较分析
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_15
T. Malkin, François-Xavier Standaert, M. Yung
{"title":"A Comparative Cost/Security Analysis of Fault Attack Countermeasures","authors":"T. Malkin, François-Xavier Standaert, M. Yung","doi":"10.1007/11889700_15","DOIUrl":"https://doi.org/10.1007/11889700_15","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"80 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116585834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 135
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered 重新考虑Wagner对安全CRT-RSA算法的攻击
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_2
Johannes Blömer, M. Otto
{"title":"Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered","authors":"Johannes Blömer, M. Otto","doi":"10.1007/11889700_2","DOIUrl":"https://doi.org/10.1007/11889700_2","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125600683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors 异步DES密码处理器故障攻击案例研究
Workshop on Fault Diagnosis and Tolerance in Cryptography Pub Date : 2006-10-10 DOI: 10.1007/11889700_9
Y. Monnet, M. Renaudin, R. Leveugle, Christophe Clavier, P. Moitrel
{"title":"Case Study of a Fault Attack on Asynchronous DES Crypto-Processors","authors":"Y. Monnet, M. Renaudin, R. Leveugle, Christophe Clavier, P. Moitrel","doi":"10.1007/11889700_9","DOIUrl":"https://doi.org/10.1007/11889700_9","url":null,"abstract":"","PeriodicalId":377447,"journal":{"name":"Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信