Cryptography Reference
In-Depth Information
141. FIPS PUB 186-3: Digital signature standard (DSS). Federal Information Processing
Standards Publication 186-3, National Institute of Standards and Technology (NIST),
Gaithersburg (2009)
142. FIPS PUB 197: Advanced Encryption Standard (AES). Federal Information Processing
Standards
Publication
197,
National
Institute
of
Standards
and
Technology
(NIST),
Gaithersburg (2001)
143. Fouque, P.A., Lercier, R., Réal, D., Valette, F.: Fault attack on elliptic curve Montgomery
ladder implementation. In: Breveglieri, L., et al., vol. 65, pp. 92-98
144. Francq, J., Faurax, O.: Security of several AES implementations against delay faults. In:
12th Nordic Workshop on Secure IT Systems (NordSec 2007), pp. 61-72 (2007)
145. Frey, G., Müller, M., Rück, H.G.: The Tate pairing and the discrete logarithm applied to
elliptic curve cryptosystems. IEEE Transac. Info. Theory 45(5), 1717-1719 (1999)
146. Frey, G., Rück, H.G.: A remark concerning m-divisibility and the discrete logarithm in the
divisor class group of curves. Math. Comput. 62(204), 865-874 (1994)
147. Frieze, A.M., Håstad, J., Kannan, R., Lagarias, J.C., Shamir, A.: Reconstructing truncated
integer variables satisfying linear congruences. SIAM J. Comput. 17(2), 262-280 (1988)
148. Fukunaga, T., Takahashi, J.: Practical fault attack on a cryptographic LSI with ISO/IEC
18033-3 block ciphers. In: Breveglieri, L., et al. vol. 66, pp. 84-92
149. Fumaroli, G., Vigilant, D.: Blinded fault resistant exponentiation. In: Breveglieri, L., et al.
vol. 69, pp. 62-70
150. Galbraith, S.D., Hess, F., Vercauteren, F.: Aspects of pairing inversion. IEEE Transac. Info.
Theory 54(12), 5119-5128 (2008)
151. Galbraith,
S.D.,
O'hEigeartaigh,
C.,
Sheedy,
C.:
Simplified
pairing
computation
and
security implications. J. Math. Cryptol. 1(3), 267-282 (2007)
152. Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: N.P. Smart (ed.) Advances in
Cryptology—EUROCRYPT
2008,
Lecture
Notes
in
Computer
Science,
vol.
4965,
pp. 31-51. Springer (2008)
153. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Koç,
C.K. et al., vol. 236, pp. 251-261
154. Garner, H.L.: The residue number system. IRE Transac. Electron. Comput. 8(6), 140-147
(1959)
155. Gaubatz,
G.,
Sunar,
B.:
Robust
finite
field
arithmetic
for
fault-tolerant
public-key
cryptography. In: Breveglieri. L., et al. vol. 69, pp. 196-210
156. Gaubatz, G., Sunar, B., Karpovsky, M.G.: Non-linear residue codes for robust public-key
arithmetic. In: Breveglieri. L., et al. vol. 69, pp. 173-184
157. Gaubatz, G., Sunar, B., Savas, E.: Sequential circuit design for embedded cryptographic
applications resilient to adversarial faults. IEEE Transac. Comput 57(1), 126-138 (2008)
133. Genelle, L., Giraud, C., Prouff, E.: Securing AES implementation against fault attacks. In:
Breveglieri, L., et al. vol. 66, pp. 51-64
159. Ghosh, S., Mukhopadhyay, D., Chowdhury, D.R.: Fault attack and countermeasures on
pairing based cryptography. Int. J. Netw. Secur. (IJNS)12(1), 26-33 (2011)
160. Giraud, C.: DFA on AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced
Encryption Standard—AES (AES 2004), Lecture Notes in Computer Science, vol. 3373,
pp. 27-41. Springer, Heidelberg (2005)
161. Giraud, C.: Fault resistant RSA implementation. In: Breveglieri, L., Koren, I. , I. , vol. 68,
pp. 142-151
162. Giraud, C.: An RSA implementation resistant to fault attacks and to simple power analysis.
IEEE Transac. Comput. 55(9), 1116-1120 (2006). Extended abstract in [161]
163. Giraud, C., Thiebeauld, H.: A survey on fault attacks. In: Quisquater, J.J. Paradinas, P.
Deswarte, Y. El Kalam, A.A. (eds.) Smart Card Research and Advanced Applications VI
(CARDIS 2004), pp. 159-176. Kluwer Academic Publishers, Toulouse (2004)
164. Giraud, C., Thillard, A.: Piret and Quisquater's DFA on AES revisited. Cryptology ePrint
Archive, Report 2010/440 (2010)
Search WWH ::




Custom Search