Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings /
In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others. Cryptosystems are inherently computationally comple...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4236 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Attacks on Public Key Systems
- Is It Wise to Publish Your Public RSA Keys?
- Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered
- Attacking Right-to-Left Modular Exponentiation with Timely Random Faults
- Sign Change Fault Attacks on Elliptic Curve Cryptosystems
- Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
- Protection of Public Key Systems
- Blinded Fault Resistant Exponentiation
- Incorporating Error Detection in an RSA Architecture
- Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation
- Attacks on and Protection of Symmetric Key Systems
- Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
- A Fault Attack Against the FOX Cipher Family
- Fault Based Collision Attacks on AES
- An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers
- Models for Fault Attacks on Cryptographic Devices
- An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices
- Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
- A Comparative Cost/Security Analysis of Fault Attack Countermeasures
- Fault-Resistant Arithmetic for Cryptography
- Non-linear Residue Codes for Robust Public-Key Arithmetic
- Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
- Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
- Fault Attacks and Other Security Threats
- DPA on Faulty Cryptographic Hardware and Countermeasures
- Fault Analysis of DPA-Resistant Algorithms
- Java Type Confusion and Fault Attacks.