Sciweavers

15 search results - page 2 / 3
» fdtc 2006
Sort
View
FDTC
2006
Springer
100views Cryptology» more  FDTC 2006»
13 years 9 months ago
A Comparative Cost/Security Analysis of Fault Attack Countermeasures
Tal Malkin, François-Xavier Standaert, Moti...
FDTC
2006
Springer
103views Cryptology» more  FDTC 2006»
13 years 9 months ago
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
Yannick Monnet, Marc Renaudin, Régis Leveug...
FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
13 years 9 months ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
13 years 9 months ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...