Pages that link to "Item:Q5934142"
From MaRDI portal
The following pages link to On the importance of eliminating errors in cryptographic computations (Q5934142):
Displaying 32 items.
- Revisiting prime power RSA (Q260044) (← links)
- Analysis of the fault attack ECDLP over prime field (Q410803) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA (Q656510) (← links)
- Fault-based attack on Montgomery's ladder algorithm (Q656523) (← links)
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding (Q778376) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field (Q893699) (← links)
- Physical attacks and beyond (Q1698608) (← links)
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures (Q1698622) (← links)
- Protecting ECC against fault attacks: the ring extension method revisited (Q2023307) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- A note on perfect correctness by derandomization (Q2146431) (← links)
- Continuously non-malleable codes in the split-state model (Q2210446) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Elliptic curve cryptosystems in the presence of permanent and transient faults (Q2486874) (← links)
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions (Q2946437) (← links)
- The Chaining Lemma and Its Application (Q2947530) (← links)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (Q3012821) (← links)
- Partial Key Exposure: Generalized Framework to Attack RSA (Q3104725) (← links)
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes (Q3506358) (← links)
- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) (Q3511179) (← links)
- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable (Q3623063) (← links)
- An Improved Fault Based Attack of the Advanced Encryption Standard (Q3637153) (← links)
- Fault based attack of the Rijndael cryptosystem (Q3637830) (← links)
- A Fault Attack on the LED Block Cipher (Q4905050) (← links)
- Witness Maps and Applications (Q5041158) (← links)
- A Note on Perfect Correctness by Derandomization (Q5267419) (← links)
- Fault-Tolerant Finite Field Computation in the Public Key Cryptosystems (Q5386085) (← links)
- Perturbating RSA Public Keys: An Improved Attack (Q5502786) (← links)
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates (Q6157511) (← links)
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack (Q6169491) (← links)