Cryptography Reference
In-Depth Information
53. Blömer, J., Otto, M., Seifert, J.P.: A new CRT-RSA algorithm secure against Bellcore
attacks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) 10th ACM Conference on Computer and
Communications Security (CCS 2003), pp. 311-320. ACM Press (2003)
54. Blömer, J., Otto, M., Seifert, J.P.: Sign change fault attacks on elliptic curve cryptosystems.
In: Breveglieri, L., et al. vol. 69, pp. 36-52
55. Blömer, J., Seifert, J.P.: Fault based cryptanalysis of the Advanced Encryption Standard
(AES).
In: Wright,
R.N. (ed.)
Financial
Cryptography (FC
2003). Lecture
Notes
in
Computer Science, vol. 2742, pp. 162-181. Springer, Heidelberg (2003)
56. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in
cryptographic computations. J. Cryptol. 14(2), 101-119 (2001). Earlier version published in
EUROCRYPT '97
57. Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J.
Comput. 32(3), 586-615 (2003)
58. Boneh, D., Venkatesan, R.: Hardness of computing the most significant bits of secret keys in
Diffie-Hellman and related schemes. In: N. Koblitz (ed.) Advances in Cryptology—
CRYPTO '96. Lecture Notes in Computer Science, vol. 1109, pp. 129-142. Springer, Berlin
(1996)
59. Bos, J.N.E.: Practical privacy. Ph.D. thesis, Eindhoven University of Technology (1992)
60. Boscher, A., Handschuh, H.: Masking does not protect against differential fault attacks. In:
Breveglieri, L., et al. 65, pp. 35-40
61. Boscher, A., Naciri, R., Prouff, E.: CRT RSA algorithm protected against fault attacks. In:
Sauveron, D., Markantonakis, C., Bilas, A., Quisquater, J.J. (eds.) Information Security
Theory and Practices (WISTP 2007). Lecture Notes in Computer Science, vol. 4462,
pp. 229-243. Springer, Heidelberg (2007)
62. Bosio, A., Di Natale, G.: LIFTING: A flexible open-source fault simulator. In: 17th Asian
Test Symposium (ATS 2008), pp. 35-40. IEEE Comput. Soc. (2008)
63. Bousselam, K., Di Natale, G., Flottes, M.L., Rouzeyre, B.: Evaluation of concurrent error
detection techniques on the Advanced Encryption Standard. In: 16th IEEE International On-
Line Testing Symposium (IOLTS 2010), pp. 223-228. IEEE Comput. Soc. (2010)
64. Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.): Fault Diagnosis and
Tolerance in Cryptography—FDTC 2007. IEEE Comput. Soc. (2007)
65. Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.): Fault Diagnosis and
Tolerance in Cryptography—FDTC 2008. IEEE Comput. Soc. (2008)
66. Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.): Fault Diagnosis and
Tolerance in Cryptography—FDTC 2009. IEEE Compu. Soc. (2009)
67. Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.): Fault Diagnosis
and Tolerance in Cryptography—FDTC 2010. IEEE Comput. Soc. (2010)
68. Breveglieri, L., Koren, I. (eds.): 2nd Workshop on Fault Diagnosis and Tolerance in
Cryptography FDTC 2005, Edinburgh (2005)
69. Breveglieri, L., Koren, I., Naccache, D., Seifert, J.P. (eds.): Fault Diagnosis and Tolerance
in Cryptography—FDTC 2006. Lecture Notes in Computer Science, vol. 4236. Springer,
Berlin (2006)
70. Brier, É., Chevallier-Mames, B., Ciet, M., Clavier, C.: Why one should also secure RSA
public key elements. In: Goubin and Matsui, vol. 167, pp. 324-338
71. Brier, É., Clavier, C., Coron, J.S., Naccache, D.: Cryptanalysis of RSA signatures with
fixed-pattern padding. In: Kilian, J. (ed.) Advances in Cryptology—CRYPTO 2001, Lecture
Notes in Computer Science, vol. 2139, pp. 433-439. Springer, Berlin (2001)
72. Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye
and Quisquater, 202, pp. 16-29
73. Brouchier, J., Kean, T., Marsh, C., Naccache, D.: Temperature attacks. IEEE Secur. Priv.
7(2), 79-82 (2009)
74. Brumley, D., Boneh, D.: Remote timing attacks are practical. Comput. Netw. 48(5),
701-716 (2005)
Search WWH ::




Custom Search