Cryptography Reference
In-Depth Information
34. Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection
procedures for a hardware implementation of the Advanced Encryption Standard. IEEE
Trans. Comput. 52(4), 492-505 (2003)
35. Bertoni, G., Breveglieri, L., Koren, I., Piuri, V.: Fault detection in the Advanced Encryption
Standard. In: Proc. of the International Conference on Massively Parallel Computing
Systems (MPCS 2002), pp. 92-97. Ischia, Italy (2002)
36. Berzati, A., Canovas, C., Castagnos, G., Debraize, B., Goubin, L., Gouget, A., Paillier, P.,
Salgado, S.: Fault analysis of GRAIN-128. In: Tehranipoor, M., Plusquellic, J. (eds.) IEEE
International Workshop on Hardware-Oriented Security and Trust (HOST 2009), pp. 7-14.
IEEE Comput. Soc. (2009)
37. Berzati, A., Canovas, C., Dumas, J.G., Goubin, L.: Fault attacks on RSA public keys: Left-
to-right implementations are also vulnerable. In: Fischlin, M. (ed.) Topics in Cryptology—
CT-RSA 2009. Lecture Notes in Computer Science, vol. 5473, pp. 414-428. Springer
(2009)
38. Berzati, A., Canovas, C., Goubin, L.: In (security) against fault injection attacks for CRT-
RSA implementations. In: Breveglieri, L., et al., vol. 65, pp. 101-107
39. Berzati, A., Canovas, C., Goubin, L.: Perturbating RSA public keys: An improved attack.
In: Oswald and Rohatgi, vol. 314, pp. 380-395
40. Berzati, A., Canovas-Dumas, C., Goubin, L.: Fault analysis of Rabbit: Toward a secret key
leakage. In: Roy, B.K., Sendrier, N. (eds.) Progress in Cryptology INDOCRYPT 2009.
Lecture Notes in Computer Science, vol. 5922, pp. 72-87. Springer (2009)
41. Berzati, A., Canovas-Dumas, C., Goubin, L.: Public key perturbation of randomized RSA
implementations. In: Mangard and Standaert, vol. 271, pp. 306-319
42. Beth, T., Jungnickel, D., Lenz, H.: Design Theory, vol 1. Cambridge University Press,
Cambridge (1999)
43. Bhasin, S., Danger, J.L., Guilley, S., Selmane, N.: Security evaluation of different AES
implementations against practical setup time violation attacks in FPGAs. In: Tehranipoor,
M., Plusquellic, J. (eds.) IEEE International Workshop on Hardware-Oriented Security and
Trust (HOST 2009), pp. 15-21. IEEE Comput. Soc. (2009)
44. Biehl, I., Meyer, B., Müller, V.: Differential fault analysis of elliptic curve cryptosystems.
In: Bellare, M. (ed.) Advances in Cryptology CRYPTO 2000. Lecture Notes in Computer
Science, vol. 1880, pp. 131-146. Springer (2000)
45. Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible fault analysis of RC4 and differential
fault analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) Fast Software Encryption (FSE
2005). Lecture Notes in Computer Science, vol. 3557, pp. 359-367. Springer (2005)
46. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes,
A.J., Vanstone S.A. (eds.) Advances in Cryptology CRYPTO '90. Lecture Notes in
Computer Science, vol. 537, pp. 2-21. Springer (1991)
47. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol.
4(1), 3-72 (1991)
48. Biham, E., Shamir, A.: A new cryptanalytic attack on DES. Manuscript (1996)
49. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski
Jr., B.S. (ed.) Advances in Cryptology CRYPTO '97. Lecture Notes in Computer
Science, vol. 1294, pp. 513-525. Springer (1997)
50. Biryukov, A.: Block and stream ciphers and the creatures in between. In: Biham, E.,
Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography, no. 0721 in Dagstuhl
Seminar Proceedings. Schloss Dagstuhl—Leibniz-Zentrum für Informatik, Germany (2007)
51. Blömer, J., Krummel, V.: Fault based collision attacks on AES. In: Breveglieri, L., et al.
(eds.) vol. 69, pp. 106-120
52. Blömer, J., Otto, M.: Wagner's attack on a secure CRT-RSA algorithm reconsidered. In:
Breveglieri, L., et al. vol. 69, pp. 13-23
Search WWH ::




Custom Search