


default search action
FDTC 2006: Yokohama, Japan
- Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert:

Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings. Lecture Notes in Computer Science 4236, Springer 2006, ISBN 3-540-46250-3
Attacks on Public Key Systems
- Shay Gueron, Jean-Pierre Seifert:

Is It Wise to Publish Your Public RSA Keys? 1-12 - Johannes Blömer, Martin Otto:

Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. 13-23 - Michele Boreale:

Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. 24-35 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:

Sign Change Fault Attacks on Elliptic Curve Cryptosystems. 36-52 - Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon:

Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. 53-61
Protection of Public Key Systems
- Guillaume Fumaroli, David Vigilant:

Blinded Fault Resistant Exponentiation. 62-70 - Luca Breveglieri

, Israel Koren, Paolo Maistri, M. Ravasio:
Incorporating Error Detection in an RSA Architecture. 71-79 - Shay Gueron:

Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. 80-87
Attacks on and Protection of Symmetric Key Systems
- Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel:

Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. 88-97 - Luca Breveglieri

, Israel Koren, Paolo Maistri:
A Fault Attack Against the FOX Cipher Family. 98-105 - Johannes Blömer, Volker Krummel:

Fault Based Collision Attacks on AES. 106-120 - Myeong-Hyeon Lee, Yoon-Hwa Choi:

An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers. 121-130
Models for Fault Attacks on Cryptographic Devices
- Kerstin Lemke-Rust, Christof Paar:

An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. 131-143 - Alfonso De Gregorio:

Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. 144-158 - Tal Malkin, François-Xavier Standaert

, Moti Yung:
A Comparative Cost/Security Analysis of Fault Attack Countermeasures. 159-172
Fault-Resistant Arithmetic for Cryptography
- Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky:

Non-linear Residue Codes for Robust Public-Key Arithmetic. 173-184 - Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:

Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection. 185-195 - Gunnar Gaubatz, Berk Sunar:

Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. 196-210
Fault Attacks and Other Security Threats
- Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:

DPA on Faulty Cryptographic Hardware and Countermeasures. 211-222 - Frédéric Amiel, Christophe Clavier, Michael Tunstall

:
Fault Analysis of DPA-Resistant Algorithms. 223-236 - Olli Vertanen:

Java Type Confusion and Fault Attacks. 237-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














