|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14 occurrences of 13 keywords
|
|
|
Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee |
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Bruno Robisson, Pascal Manet |
Differential Behavioral Analysis. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Differential Behavioral Analysis, Safe-Error, Block Ciphers, AES, Differential Power Analysis, Fault Attacks |
28 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
26 | Chih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang |
A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error Attacks. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Marc Joye |
Highly Regular m-Ary Powering Ladders. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder, SPA-type attacks, safe-error attacks, Exponentiation algorithms |
13 | Kevin Hector, Pierre-Alain Moëllic, Mathieu Dumont, Jean-Max Dutertre |
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Kevin Hector, Pierre-Alain Moëllic, Jean-Max Dutertre, Mathieu Dumont |
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models. |
ESORICS Workshops (2) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Fabio Campos, Juliane Krämer, Marcel Müller |
Safe-Error Attacks on SIKE and CSIDH. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Luk Bettale, Simon Montoya, Guénaël Renault |
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Fabio Campos, Juliane Krämer, Marcel Müller |
Safe-Error Attacks on SIKE and CSIDH. |
SPACE |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Luk Bettale, Simon Montoya, Guénaël Renault |
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-. |
FDTC |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty |
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
13 | Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty |
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
13 | Miguel Oliveira e Silva, Pedro G. Francisco |
Contract-Java: Design by Contract in Java with Safe Error Handling. |
SLATE |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede |
A systematic M safe-error detection in hardware implementations of cryptographic algorithms. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
13 | Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede |
Systematic security evaluation method against C safe-error attacks. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
11 | JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha |
A new fault cryptanalysis on montgomery ladder exponentiation algorithm. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis |
7 | Jörn-Marc Schmidt, Christoph Herbst |
A Practical Fault Attack on Square and Multiply. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
7 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
7 | Frédéric Muller, Frédéric Valette |
High-Order Attacks Against the Exponent Splitting Protection. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
7 | ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim |
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
7 | Hans-Jürgen Dobner, Stefan Ritter |
Attacking a Conjecture in Mathematical Physics by Combining Methods of Computational Analysis and Scientific Computing. |
Reliab. Comput. |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #22 of 22 (100 per page; Change: )
|
|