default search action
FDTC 2006: Yokohama, Japan
- Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert:
Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings. Lecture Notes in Computer Science 4236, Springer 2006, ISBN 3-540-46250-3
Attacks on Public Key Systems
- Shay Gueron, Jean-Pierre Seifert:
Is It Wise to Publish Your Public RSA Keys? 1-12 - Johannes Blömer, Martin Otto:
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. 13-23 - Michele Boreale:
Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. 24-35 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
Sign Change Fault Attacks on Elliptic Curve Cryptosystems. 36-52 - Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon:
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. 53-61
Protection of Public Key Systems
- Guillaume Fumaroli, David Vigilant:
Blinded Fault Resistant Exponentiation. 62-70 - Luca Breveglieri, Israel Koren, Paolo Maistri, M. Ravasio:
Incorporating Error Detection in an RSA Architecture. 71-79 - Shay Gueron:
Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. 80-87
Attacks on and Protection of Symmetric Key Systems
- Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel:
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. 88-97 - Luca Breveglieri, Israel Koren, Paolo Maistri:
A Fault Attack Against the FOX Cipher Family. 98-105 - Johannes Blömer, Volker Krummel:
Fault Based Collision Attacks on AES. 106-120 - Myeong-Hyeon Lee, Yoon-Hwa Choi:
An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers. 121-130
Models for Fault Attacks on Cryptographic Devices
- Kerstin Lemke-Rust, Christof Paar:
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. 131-143 - Alfonso De Gregorio:
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. 144-158 - Tal Malkin, François-Xavier Standaert, Moti Yung:
A Comparative Cost/Security Analysis of Fault Attack Countermeasures. 159-172
Fault-Resistant Arithmetic for Cryptography
- Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky:
Non-linear Residue Codes for Robust Public-Key Arithmetic. 173-184 - Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection. 185-195 - Gunnar Gaubatz, Berk Sunar:
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. 196-210
Fault Attacks and Other Security Threats
- Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:
DPA on Faulty Cryptographic Hardware and Countermeasures. 211-222 - Frédéric Amiel, Christophe Clavier, Michael Tunstall:
Fault Analysis of DPA-Resistant Algorithms. 223-236 - Olli Vertanen:
Java Type Confusion and Fault Attacks. 237-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.