Cryptography Reference
In-Depth Information
120. Di Natale, G., Flottes, M.L., Rouzeyre, B.: An on-line fault detection scheme for Sboxes in
secure circuits. In: 13th IEEE International On-Line Testing Symposium (IOLTS 2007),
pp. 57-62. IEEE Comput. Soc. (2007)
121. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transac. Info. Theory
22(6), 644-654 (1976)
122. Domínguez-Oviedo, A.: On fault-based attacks and countermeasures for elliptic curve
cryptosystems. Ph.D. thesis, University of Waterloo (2008)
123. Domínguez-Oviedo, A., Hasan, M.A.: Error detection and fault tolerance in ECSM using
input randomization. IEEE Trans. Dependable Secur. Comput. 6(3), 175-187 (2009)
124. Domínguez-Oviedo, A., Hasan, M.A.: Algorithm-level error detection for Montgomery
ladder-based ECSM. J. Cryptogr. Eng. 1(1), 57-69 (2011)
125. Dottax, E., Giraud, C., Rivain, M., Sierra, Y.: On second-order fault analysis resistance for
CRT-RSA implementations. In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C.J.,
Quisquater, J.J. (eds.) Information Security Theory and Practices (WISTP 2009), Lecture
Notes in Computer Science, vol. 5746, pp. 68-83. Springer, Berlin (2009)
126. Doulcier, M., Di Natale, G., Flottes, M.L., Rouzeyre, B.: Self-test techniques for crypto-
devices. IEEE Transac. VLSI 18(2), 329-333 (2010)
127. Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. In: J. Zhou, M.
Yung, Y. Han (eds.) Applied Cryptography and Network Security (ACNS 2003), Lecture
Notes in Computer Science, vol. 2846, pp. 293-306. Springer, Berlin (2003)
128. Dutertre, J.M., Mirbaha, A.P., Naccache, D., Tria, A.: Very close to perfect solutions against
power attacks. Presented at the rump session of EUROCRYPT 2010 (2010)
129. Duursma, I.M., Lee, H.S.: Tate pairing implementation for hyperelliptic curves
y
2
¼
x
p
x
þ
d. In: C.S. Laih (ed.) Advances in Cryptology—ASIACRYPT 2003,
Lecture Notes in Computer Science, vol. 2894, pp. 111-123. Springer, Berlin (2003)
130. Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On
the power of power analysis in the real world: A complete break of the KeeLoq code
hopping scheme. In: Wagner, D. (ed.) Advances in Cryptology— CRYPTO 2008, Lecture
Notes in Computer Science, vol. 5157, pp. 203-220. Springer, Berlin (2008)
131. El Mrabet, N.: What about vulnerability to a fault attack of the Miller's algorithm during an
identity based protocol. In: Park, J.H., Chen, H.H., Atiquzzaman, M., Lee, C., Kim, T.H.,
Yeo, S.S. (eds.) Advances in Information Security and Assurance (ISA 2009), Lecture Notes
in Computer Science, vol. 5576, pp. 122-134. Springer (2009)
132. EMV: Integrated circuit card specifications for payment systems. Book 2. Security and key
management. Version 4.2 (2008).
http://www.emvco.com/
133. The eSTREAM project.
http://www.ecrypt.eu.org/stream/
134. fail0verflow: Console hacking 2010. Presented at the 27th Annual Chaos Communication
Conference (2010)
135. Farhan, S.M., Khan, S.A., Jamal, H.: Mapping of high-bit algorithm to low-bit for optimized
hardware implementation. In: 16th International Conference on Microelectronics (ICM
2004), pp. 148-151. IEEE Press (2004)
136. Faurax, O., Tria, A., Freund, L., Bancel, F.: Robustness of circuits under delay-induced
faults: test of AES with the PAFI tool. In: 13th IEEE International On-Line Testing
Symposium (IOLTS 2007), pp. 185-186. IEEE Comput. Soc. (2007)
137. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems
using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) vol. 202, pp. 357-370
138. Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEE
Proc. Info. Secur. 152(1), 13-20 (2005)
139. Fenn, S.T.J., Gössel, M., Benaissa, M., Taylor, D.: On-line error detection for bit-serial
multipliers in GF
ð
2
m
Þ
. J. Electr. Test. Theory and Appl. 13(1), 29-40 (1998)
140. Finney, H.: An RC4 cycle that can't happen. Posting to sci.crypt (1994)