Public Key Cryptography - PKC 2005
From MaRDI portal
Publication:5711584
DOI10.1007/b105124zbMath1081.94533OpenAlexW2506201965MaRDI QIDQ5711584
Phong Q. Nguyen, Michael Tunstall, David Naccache, Claire Whelan
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b105124
Related Items (10)
(EC)DSA lattice attacks based on Coppersmith's method ⋮ Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm ⋮ Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA ⋮ Masking Tables—An Underestimated Security Risk ⋮ A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones ⋮ All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks ⋮ Fault Attacks on Public Key Elements: Application to DLP-Based Schemes ⋮ Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures ⋮ Differential fault analysis of AES: toward reducing number of faults ⋮ Safe-Errors on SPA Protected Implementations with the Atomicity Technique
This page was built for publication: Public Key Cryptography - PKC 2005