Cryptography Reference
In-Depth Information
226. Kim, C.H., Quisquater, J.J.: Fault attacks for CRT based RSA: New attacks, new results,
and new countermeasures. In: Sauveron, D., Markantonakis, C., Bilas, A., Quisquater, J.J.
(eds.)
Information
Security
Theory
and
Practices
(WISTP
2007),
Lecture
Notes
in
Computer Science, vol. 4462, pp. 215-228. Springer, Berlin (2007)
227. Kim, C.H., Quisquater, J.J.: Faults, injection methods, and fault attacks. IEEE Des. Test
Comput. 24(6), 544-545 (2007)
228. Kim, C.H., Quisquater, J.J.: How can we overcome both side channel analysis and fault
attacks on RSA-CRT?. In: Breveglieri et al. [64], pp. 21-29
229. Kim, C.H., Quisquater, J.J.: New differential fault analysis on AES key schedule: Two faults
are enough. In: Grimaud, G., Standaert, F.X. (eds.) Smart Card Research and Advanced
Applications (CARDIS 2008), Lecture Notes in Computer Science, vol. 5189, pp. 48-60.
Springer, Berlin (2008)
230. Kim, T.H., Takagi, T., Han, D.G., Kim, H.W., Lim, J.: Side channel attacks and
countermeasures on pairing based cryptosystems over binary fields. In: Pointcheval, D., Mu,
Y., Chen, K. (eds.) Cryptology and Network Security (CANS 2006), Lecture Notes in
Computer Science, vol. 4301, pp. 168-181. Springer, Berlin (2006)
231. Kircanski, A., Youssef, A.M.: Differential fault analysis of HC-128. In: Bernstein, D.J.,
Lange,
T.
(eds.)
Progress
in
Cryptology—AFRICACRYPT
2010,
Lecture
Notes
in
Computer Science, vol. 6055, pp. 261-278. Springer, Berlin (2010)
232. Kleinjung, T., Aoki, K., Franke, J., Lenstra, A.K., Thomé, E., Bos, J.W., Gaudry, P.,
Kruppa, A., Montgomery, P.L., Osvik, D.A., te Riele, H.J.J., Timofeev, A., Zimmermann,
P.: Factorization of a 768-bit RSA modulus. In: Rabin, T. (ed.) Advances in Cryptology—
CRYPTO 2010, Lecture Notes in Computer Science, vol. 6223, pp. 333-350. Springer,
Berlin (2010)
233. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203-209 (1987)
234. KoÇ, Ç.K.: High-speed RSA implementation. Technical Report TR 201, RSA Laboratories
(1994)
235. Koç, Ç. K., Acar, T.: Montgomery multiplication in GF ð 2 k Þ . Des. Codes Cryptogr. 14(1),
57-69 (1998)
236. Koç, Ç.K., Naccache, D., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems
CHES 2001, Lecture Notes in Computer Science, vol. 2162. Springer, Berlin (2001)
237. Koç, Ç.K., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems CHES '99,
Lecture Notes in Computer Science, vol. 1717. Springer, Berlin (1999)
238. Koç, Ç.K., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems CHES 2000,
Lecture Notes in Computer Science, vol. 1965. Springer, Berlin (2000)
239. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other
systems. In: Koblitz, N. (ed.) Advances in Cryptology CRYPTO '96, Lecture Notes in
Computer Science, vol. 1109, pp. 104-113. Springer, Berlin (1996)
240. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener M.J. (ed.) Advances
in
Cryptology CRYPTO '99,
Lecture
Notes
in
Computer
Science,
vol.
1666,
pp. 388-397. Springer, Berlin (1999)
241. Kulikowski, K.: Codes and circuits for secure hardware design. Ph.D. thesis, Boston
University (2009)
242. Kulikowski, K.J., Karpovsky, M.G., Taubin, A.: Fault attack resistant cryptographic
hardware with uniform error detection. In: Breveglieri et al. [69], pp. 185-195
243. Kulikowski, K.J., Karpovsky, M.G., Taubin, A.: Power attacks on secure hardware based on
early propagation of data. In: 12th IEEE International On-Line Testing Symposium (IOLTS
2006), pp. 131-138. IEEE Computer Society (2006)
244. Kulikowski, K.J., Venkataraman, V., Wang, Z., Taubin, A., Karpovsky, M.G.:
Asynchronous balanced gates tolerant to interconnect variability. In: IEEE International
Symposium on Circuits and Systems (ISCAS 2008), pp. 3190-3193. IEEE Press (2008)
Search WWH ::




Custom Search