Fault analysis in cryptography. Foreword by Dan Boneh
DOI10.1007/978-3-642-29656-7zbMATH Open1250.94006OpenAlexW154022573MaRDI QIDQ429055FDOQ429055
Authors:
Publication date: 26 June 2012
Published in: Information Security and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-29656-7
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Collections of articles of miscellaneous specific interest (00B15) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Cited In (9)
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- On the use of RSA public exponent to improve implementation efficiency and side-channel resistance
- White-box cryptography: don't forget about grey-box attacks
- Security of hedged Fiat-Shamir signatures under fault attacks
- Statistical properties of side-channel and fault injection attacks using coding theory
- Protecting ECC against fault attacks: the ring extension method revisited
- Combined attack on CRT-RSA. Why public verification must not be public?
- Title not available (Why is that?)
- Buying AES design resistance with speed and energy
This page was built for publication: Fault analysis in cryptography. Foreword by Dan Boneh
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q429055)