Sciweavers

9 search results - page 2 / 2
» Low Voltage Fault Attacks on the RSA Cryptosystem
Sort
View
WISTP
2009
Springer
14 years 21 days ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
13 years 11 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
LATINCRYPT
2010
13 years 3 months ago
Combined Implementation Attack Resistant Exponentiation
Different types of implementation attacks, like those based on side channel leakage and active fault injection, are often considered as separate threats. Countermeasures are, there...
Jörn-Marc Schmidt, Michael Tunstall, Roberto ...
ICISC
1998
87views Cryptology» more  ICISC 1998»
13 years 7 months ago
Rabin and RSA analogues based on non-maximal imaginary quadratic orders
Abstract. In 14] and 21] there are proposed ElGamal-type cryptosystems based on non-maximal imaginary quadratic orders with fast trapdoor decryption. The trapdoor information is th...
Detlef Hühnlein, Andreas Meyer, Tsuyoshi Taka...