Cryptography Reference
In-Depth Information
427. Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based
cryptanalysis. IEEE Transac. Comput. 49(9), 967-970 (2000)
428. Yen, S.M., Kim, D.: Cryptanalysis of two protocols for RSA with CRT based on fault
injection. In: L. Breveglieri, I. Koren (eds.) 1st Workshop on Fault Diagnosis and Tolerance
in Cryptography—FDTC 2004, pp. 381-385. Florence, Italy (2004)
429. Yen, S.M., Kim, S., Lim, S., Moon, S.J.: A countermeasure against one physical
cryptanalysis may benefit another attack. In: K. Kim (ed.) Information Security and
Cryptology—ICISC 2001, Lecture Notes in Computer Science, vol. 2288, pp. 269-294.
Springer, Heidelberg (2002)
430. Yen, S.M., Kim, S., Lim, S., Moon, S.J.: RSA speedup with Chinese remainder theorem
immune against hardware fault cryptanalysis. IEEE Transac. Comput. 52(4), 461-472
(2003)
431. Yen, S.M., Ko, L.C., Moon, S.J., Ha, J.: Relative doubling attack against Montgomery
ladder. In: D. Won, S. Kim (eds.) Information Security and Cryptology—ICISC 2005,
Lecture Notes in Computer Science, vol. 3935, pp. 117-128. Springer, Heidelberg (2006)
432. Yen, S.M., Moon, S.J., Ha, J.: Hardware fault attack on RSA with CRT revisited. In: P.J.
Lee, C.H. Lim (eds.) Information Security and Cryptology—ICISC 2002, Lecture Notes in
Computer Science, vol. 2587, pp. 374-388. Springer, Heidelberg (2003)
433. Zhang, X., Parhi, K.K.: Implementation approaches for the advanced encryption standard
algorithm. IEEE Circu. Syst. Mag. 2(4), 24-46 (2002)
434. Zhao, C.A., Zhang, F., Huang, J.: A note on the Ate pairing. Int. J. Info. Secur. 7(6),
379-382 (2008)
435. Ziegler, J.F., Lanford, W.A.: Effect of cosmic rays on computer memories. Science
206(4420), 776-788 (1979)
Search WWH ::




Custom Search