Sciweavers

FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
15 years 7 months ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
93
Voted
FDTC
2006
Springer
93views Cryptology» more  FDTC 2006»
15 years 7 months ago
Fault Based Collision Attacks on AES
Johannes Blömer, Volker Krummel
FDTC
2006
Springer
91views Cryptology» more  FDTC 2006»
15 years 7 months ago
Fault Analysis of DPA-Resistant Algorithms
Frederic Amiel, Christophe Clavier, Michael Tunsta...
FDL
2006
IEEE
15 years 7 months ago
Verification-Oriented Behavioral Modeling of Non-Linear Analog
In this work, an approach to the `verification-oriented' modeling of the analog parts' behavior of mixed-signal circuits is presented. Starting from a continuous-time, c...
Martin Freibothe, Jens Doege, Torsten Coym, Stefan...