Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures
Tóm tắt
Từ khóa
Tài liệu tham khảo
boscher, 2010, Fault resistant RSA signatures Chinese remaindering in both directions
yen, 2003, RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis, IEEE Trans Comput, 52, 461, 10.1109/TC.2003.1190587
schmidt, 2007, Optical and EM fault-attacks on CRT-based RSA: Concrete results, Proc Austrian Workshop Microelectron, 61
skorobogatov, 2002, Optical fault induction attacks, Proc Workshop Cryptogr Hardware Embedded Syst, 2
skorobogatov, 2005, Semi-Invasive AttacksA New Approach to Hardware Security Analysis
0, Ibm 4764 pci-x Cryptographic Coprocessor Specifications
barenghi, 2011, Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65 nm AES implementation, Proc Workshop RFID Security Privacy, 48
1995, DES Encryption and Decryption Unit with Error Checking
1999, Method and apparatus for protecting public key schemes from timing and fault attacks
ciet, 2005, Practical fault countermeasures for Chinese remaindering based RSA, Proc Workshop Fault Diagnosis Tolerance Cryptogr, 124
menezes, 1996, Handbook of Applied Cryptography
koren, 2007, Fault Tolerant Systems
bernstein, 2009, DNSCurve Usable Security for DNS
2010, ST23 Highly Secure Smartcard ICs
hardy, 1979, An Introduction to the Theory of Numbers
2009, IEEE Standard Specifications for Password-Based Public-Key Cryptographic Techniques
2009, Digital Signature Standard (DSS)
blomer, 2005, Sign change fault attacks on elliptic curve cryptosystems, Proc Workshop Fault Diagnosis Tolerance Cryptogr, 25
knuth, 1997, Art of Computer Programming Volume 2 Seminumerical Algorithms
2008, Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography 10 August 2008
2006, SNOW 3G Specifications
ekdahl, 2003, A new version of the stream cipher SNOW, Proc Sel Areas Cryptogr, 2595, 47, 10.1007/3-540-36492-7_5
2005, ISO/IEC 18033-4 2005 Information TechnologySecurity TechniquesEncryption AlgorithmsPart 4 Stream Ciphers
1999, Data Encryption Standard (DES)
curtin, 2005, Brute Force Cracking the Data Encryption Standard
2001, Advanced Encryption Standard
daemen, 2002, The Design of Rijndael AESThe Advanced Encryption Standard
coppersmitsh, 1996, Low-exponent RSA with related messages, Proc EUROCRYPT, 1
2008, IEEE P-1619 Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
2008, The Transport Layer Security (TLS) Protocol Version 1 2
1997, IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
biham, 1997, Differential fault analysis of secret key cryptosystems, Proc Crypto, 513
boneh, 1997, On the importance of checking cryptographic protocols for faults, Proc EUROCRYPT, 37
2006, Proceedings of the Third International Workshop in Fault Diagnosis and Tolerance in Cryptography 10 October 2006, 4236
lenstra, 1996, Memo on RSA signature generation in the presence of faults
2007, Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography 10 September 2007
peacham, 2006, A DFA Attack Against the AES Key Schedule