Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings /

In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others. Cryptosystems are inherently computationally comple...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Breveglieri, Luca (Editor), Koren, Israel (Editor), Naccache, David (Editor), Seifert, Jean-Pierre (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Series:Lecture Notes in Computer Science, 4236
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Attacks on Public Key Systems
  • Is It Wise to Publish Your Public RSA Keys?
  • Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered
  • Attacking Right-to-Left Modular Exponentiation with Timely Random Faults
  • Sign Change Fault Attacks on Elliptic Curve Cryptosystems
  • Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
  • Protection of Public Key Systems
  • Blinded Fault Resistant Exponentiation
  • Incorporating Error Detection in an RSA Architecture
  • Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation
  • Attacks on and Protection of Symmetric Key Systems
  • Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
  • A Fault Attack Against the FOX Cipher Family
  • Fault Based Collision Attacks on AES
  • An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers
  • Models for Fault Attacks on Cryptographic Devices
  • An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices
  • Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
  • A Comparative Cost/Security Analysis of Fault Attack Countermeasures
  • Fault-Resistant Arithmetic for Cryptography
  • Non-linear Residue Codes for Robust Public-Key Arithmetic
  • Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
  • Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
  • Fault Attacks and Other Security Threats
  • DPA on Faulty Cryptographic Hardware and Countermeasures
  • Fault Analysis of DPA-Resistant Algorithms
  • Java Type Confusion and Fault Attacks.