Sciweavers

3 search results - page 1 / 1
» Protection and Recovery of Disk Encryption Key Using Smart C...
Sort
View
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
13 years 8 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
13 years 10 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...