Sciweavers

FDTC
2006
Springer
91views Cryptology» more  FDTC 2006»
13 years 8 months ago
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered
Johannes Blömer, Martin Otto 0002
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
13 years 8 months ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...
FDTC
2006
Springer
103views Cryptology» more  FDTC 2006»
13 years 8 months ago
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
Yannick Monnet, Marc Renaudin, Régis Leveug...
FDTC
2006
Springer
100views Cryptology» more  FDTC 2006»
13 years 8 months ago
A Comparative Cost/Security Analysis of Fault Attack Countermeasures
Tal Malkin, François-Xavier Standaert, Moti...
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
13 years 8 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
13 years 8 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 8 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 8 months ago
Non-linear Residue Codes for Robust Public-Key Arithmetic
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a novel family of non-linear arithmetic residue codes. These codes have a very hi...
Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky