Bug Attacks
From MaRDI portal
Publication:3600222
DOI10.1007/978-3-540-85174-5_13zbMath1183.94022OpenAlexW2913844835MaRDI QIDQ3600222
Eli Biham, Adi Shamir, Yaniv Carmeli
Publication date: 10 February 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_13
Related Items
Practical Realisation and Elimination of an ECC-Related Software Bug Attack ⋮ Bug attacks ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications ⋮ Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority ⋮ Secure Set Intersection with Untrusted Hardware Tokens ⋮ Processor anchor to increase the robustness against fault injection and cyber attacks
Cites Work
- Markov Ciphers and Differential Cryptanalysis
- A method for obtaining digital signatures and public-key cryptosystems
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Fast Software Encryption
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item