|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 55 occurrences of 24 keywords
|
|
|
Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
142 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 473-484, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
122 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
A new CRT-RSA algorithm secure against bellcore attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 311-320, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack |
120 | Sining Liu, Brian King, Wei Wang 0003 |
A CRT-RSA Algorithm Secure against Hardware Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 51-60, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
algorithm, smart card, RSA, Chinese Remainder Theorem |
104 | Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra |
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 68-83, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Second Order, CRT-RSA, Fault Attacks, Countermeasure |
104 | Johannes Blömer, Martin Otto 0002 |
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 13-23, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CRT-RSA, BOS-Scheme, Wagner’s attack, smartcards, fault attacks |
77 | Baodong Qin, Ming Li, Fanyu Kong |
Cryptanalysis of a Type of CRT-Based RSA Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(2), pp. 214-221, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL |
76 | Alexandre Berzati, Cécile Canovas, Louis Goubin |
In(security) Against Fault Injection Attacks for CRT-RSA Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008, pp. 101-107, 2008, IEEE Computer Society, 978-0-7695-3314-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Arnaud Boscher, Robert Naciri, Emmanuel Prouff |
CRT RSA Algorithm Protected Against Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 229-243, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation |
53 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 228-243, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
43 | Hridoy Jyoti Mahanta, Ajoy Kumar Khan |
A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 12(2/3), pp. 112-129, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Santanu Sarkar 0001, Subhamoy Maitra |
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 106, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
43 | Abderrahmane Nitaj |
A New Attack on RSA and CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings, pp. 221-233, 2012, Springer, 978-3-642-31409-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Jean-Sébastien Coron, Christophe Giraud 0001, Nicolas Morin, Gilles Piret, David Vigilant |
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 89-96, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
CRT-RSA, Fault Attacks |
31 | |
Retraction Note: An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 28(1), pp. 23, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | |
An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 27(3), pp. 1405-1418, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1163, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
31 | Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV, pp. 508-536, 2022, Springer, 978-3-031-22971-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Alexander May 0001, Julian Nowakowski, Santanu Sarkar 0001 |
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 972, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
31 | Alexander May 0001, Julian Nowakowski, Santanu Sarkar 0001 |
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I, pp. 99-129, 2021, Springer, 978-3-030-92061-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Kento Oonishi, Noboru Kunihiro |
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 642-652, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Fanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou |
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNS ![In: ICCNS 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019, pp. 123-127, 2019, ACM, 978-1-4503-7662-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro |
Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 278-296, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Kento Oonishi, Noboru Kunihiro |
Attacking Noisy Secret CRT-RSA Exponents in Binary Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 37-54, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Fanyu Kong, Dashui Zhou, Yali Jiang, Jianwei Shang, Jia Yu 0003 |
Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE/EUC (1) ![In: 2017 IEEE International Conference on Computational Science and Engineering, CSE 2017, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2017, Guangzhou, China, July 21-24, 2017, Volume 1, pp. 866-869, 2017, IEEE Computer Society, 978-1-5386-3220-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Atsushi Takayasu, Noboru Kunihiro |
Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings, pp. 35-47, 2016, Springer, 978-3-319-45870-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Seema Verma, Deepak Garg 0002 |
Improvement in rebalanced CRT RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 12(6), pp. 524-531, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
31 | Atsushi Takayasu, Noboru Kunihiro |
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers, pp. 518-537, 2015, Springer, 978-3-319-28165-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | João Carlos Néto, Alexandre Ferreira Tenca, Wilson Vicente Ruggiero |
CRT RSA decryption: Modular exponentiation based solely on Montgomery Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSSC ![In: 49th Asilomar Conference on Signals, Systems and Computers, ACSSC 2015, Pacific Grove, CA, USA, November 8-11, 2015, pp. 431-436, 2015, IEEE, 978-1-4673-8576-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
A formal proof of countermeasures against fault injection attacks on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 4(3), pp. 173-185, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1401.8172, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1412.0600, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1401.8170, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 559, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPREW@POPL ![In: Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2014, PPREW 2014, January 25, 2014, San Diego, CA, USA, pp. 2:1-2:10, 2014, ACM, 978-1-4503-2649-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Yao Lu 0002, Rui Zhang 0002, Dongdai Lin |
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings, pp. 151-162, 2014, Springer, 978-3-319-07535-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014, pp. 68-82, 2014, IEEE Computer Society, 978-1-4799-6292-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Benoit Feix, Hugues Thiebeauld, Lucille Tordella |
Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, pp. 53-67, 2014, Springer, 978-3-319-13038-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Santanu Sarkar 0001, Ayineedi Venkateswarlu |
Partial Key Exposure Attack on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, pp. 255-264, 2014, Springer, 978-3-319-13038-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Maria Christofi, Boutheina Chetali, Louis Goubin, David Vigilant |
Formal verification of a CRT-RSA implementation against fault attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 3(3), pp. 157-167, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 506, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
31 | Pablo Rauzy, Sylvain Guilley |
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 810, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
31 | Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud 0001, Guénaël Renault, Soline Renner, Rina Zeitoun |
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 198-215, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Apostolos P. Fournaris, Odysseas G. Koufopavlou |
Protecting CRT RSA against Fault and Power Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012, Amherst, MA, USA, August 19-21, 2012, pp. 159-164, 2012, IEEE Computer Society, 978-1-4673-2234-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Apostolos P. Fournaris, Odysseas G. Koufopavlou |
CRT RSA Hardware Architecture with Fault and Simple Power Attack Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 15th Euromicro Conference on Digital System Design, DSD 2012, Cesme, Izmir, Turkey, September 5-8, 2012, pp. 661-667, 2012, IEEE Computer Society, 978-1-4673-2498-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Santanu Sarkar 0001, Subhamoy Maitra |
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, pp. 476-493, 2012, Springer, 978-3-642-33026-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Sung-Kyoung Kim, Tae Hyun Kim 0003, Dong-Guk Han, Seokhie Hong |
An efficient CRT-RSA algorithm secure against power and fault attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 84(10), pp. 1660-1669, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Apostolos P. Fournaris, Odysseas G. Koufopavlou |
Efficient CRT RSA with SCA Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 14th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, DSD 2011, August 31 - September 2, 2011, Oulu, Finland, pp. 593-599, 2011, IEEE Computer Society, 978-1-4577-1048-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Santanu Sarkar 0001, Subhamoy Maitra |
Cryptanalysis of Dual CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 603, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
31 | Nevine Maurice Ebeid, Rob Lambert |
A new CRT-RSA algorithm resistant to powerful fault attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WESS ![In: Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, Scottsdale, AZ, USA, October 24, 2010, pp. 8, 2010, ACM, 978-1-4503-0078-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Elena Trichina, Roman Korkikyan |
Multi Fault Laser Attacks on Protected CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 75-86, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Cortex M3, RSA, Chinese Remainder Theorem, Fault Attacks, laser |
31 | Subhamoy Maitra, Santanu Sarkar 0001 |
Efficient CRT-RSA Decryption for Small Encryption Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, pp. 26-40, 2010, Springer, 978-3-642-11924-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra |
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 24, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
31 | Subhamoy Maitra, Santanu Sarkar 0001 |
On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 62, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
31 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 92-97, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
27 | Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier |
Fault Attacks on RSA Signatures with Partially Unknown Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 444-456, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Coppersmith’s theorem, iso/iec 9796-2, digital signatures, rsa, Fault attacks |
19 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 185-203, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
Displaying result #1 - #56 of 56 (100 per page; Change: )
|
|