Sciweavers

3 search results - page 1 / 1
» Protection and Recovery of Disk Encryption Key Using Smart C...
Sort
View
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
15 years 2 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
15 years 4 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...