Sciweavers

99
Voted
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
15 years 4 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
69
Voted
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 4 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
82
Voted
FDTC
2006
Springer
91views Cryptology» more  FDTC 2006»
15 years 4 months ago
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered
Johannes Blömer, Martin Otto 0002
99
Voted
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
15 years 4 months ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...
94
Voted
FDTC
2006
Springer
121views Cryptology» more  FDTC 2006»
15 years 4 months ago
Java Type Confusion and Fault Attacks
Olli Vertanen
73
Voted
FDTC
2006
Springer
103views Cryptology» more  FDTC 2006»
15 years 4 months ago
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
Yannick Monnet, Marc Renaudin, Régis Leveug...
79
Voted
FDTC
2006
Springer
100views Cryptology» more  FDTC 2006»
15 years 4 months ago
A Comparative Cost/Security Analysis of Fault Attack Countermeasures
Tal Malkin, François-Xavier Standaert, Moti...
83
Voted
FDTC
2006
Springer
107views Cryptology» more  FDTC 2006»
15 years 4 months ago
An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers
Myeong-Hyeon Lee, Yoon-Hwa Choi
112
Voted
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
15 years 4 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
114
Voted
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
15 years 4 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...