scientific article; zbMATH DE number 1088257
From MaRDI portal
Publication:4364574
zbMATH Open0886.94010MaRDI QIDQ4364574FDOQ4364574
Authors: Eli Biham, Adi Shamir
Publication date: 12 May 1998
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- A Leakage-Resilient Mode of Operation
- Fast Software Encryption
- Continuously non-malleable codes against bounded-depth tampering
- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
- A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.
- Differential Behavioral Analysis
- Relations between robustness and RKA security under public-key encryption
- Fault analysis of grain-128 by targeting NFSR
- A New Attack on the LEX Stream Cipher
- \textsc{scope}: on the side channel vulnerability of releasing unverified plaintexts
- Statistical fault attacks on nonce-based authenticated encryption schemes
- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Fault-based analysis of flexible ciphers
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- Differential fault analysis of DES
- On the importance of eliminating errors in cryptographic computations
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Bug Attacks
- White-box cryptography: don't forget about grey-box attacks
- Strong authenticated key exchange with auxiliary inputs
- Differential fault analysis of AES: toward reducing number of faults
- FIMA: fault intensity map analysis
- Signature schemes secure against hard-to-invert leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Applied Cryptography and Network Security
- Differential Propagation Analysis of Keccak
- Related-key almost universal hash functions: definitions, constructions and applications
- An Improved Fault Based Attack of the Advanced Encryption Standard
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Polar differential power attacks and evaluation
- Differential fault analysis on block cipher SEED
- Fault Analysis Study of IDEA
- Title not available (Why is that?)
- Perturbating RSA Public Keys: An Improved Attack
- Title not available (Why is that?)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Error detection and error correction procedures for the advanced encryption standard
- Preventing fault attacks using fault randomization with a case study on AES
- Design of fault-resilient S-boxes for AES-like block ciphers
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
- Improved fault analysis on the block cipher SPECK by injecting faults in the same round
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Title not available (Why is that?)
- Efficient completely non-malleable and RKA secure public key encryptions
- Fault template attacks on block ciphers exploiting fault propagation
- Persistent fault analysis with few encryptions
- An improved differential fault analysis on AES-256
- Differential fault analysis on SMS4 using a single fault
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Title not available (Why is that?)
- Title not available (Why is that?)
- Checking before output may not be enough against fault-based cryptanalysis
- Provably secure certificate-based encryption with leakage resilience
- Fault analysis of Rabbit: toward a secret key leakage
- Serpent: a new block cipher proposal
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Attacking block ciphers
- On the impossibility of cryptography with tamperable randomness
- Fully leakage-resilient signatures
- Side-channel resistant crypto for less than 2,300 GE
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- Strongly leakage resilient authenticated key exchange, revisited
- Fault analysis of the NTRUSign digital signature scheme
- Differential fault attack on Montgomery ladder and in the presence of scalar randomization
- A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
- Fault analysis of Trivium
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
- On the structural weakness of the GGHN stream cipher
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
- Two improved multiple-differential collision attacks
- Locally decodable and updatable non-malleable codes and their applications
- Differential fault attack on Rocca
- Differential fault attack on lightweight block cipher PIPO
- SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA
- A new class of security oriented error correcting robust codes
- Information-combining differential fault attacks on DEFAULT
- Combined fault and leakage resilience: composability, constructions and compiler
- Ciphertext-only fault attacks on PRESENT
- Side channel cryptanalysis of product ciphers
- Efficiently testable circuits without conductivity
- Differential faultt attack on \texttt{DEFAULT}
- A stealthy hardware Trojan based on a statistical fault attack
- Title not available (Why is that?)
- Theoretical differential fault attacks on FLIP and FiLIP
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Forced Independent Optimized Implementation of 4-Bit S-Box
- \textsf{ISAP+}: \textsf{ISAP} with fast authentication
- DEFAULT: cipher level resistance against differential fault attack
- Combined attack on CRT-RSA. Why public verification must not be public?
- Differential fault analysis of Sosemanuk
- Quantitative fault injection analysis
- Differential Fault Analysis on DES Middle Rounds
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- Proving SIFA protection of masked redundant circuits
- Differential fault analysis on KeeLoq and SHACAL-1
- Leakage resilient strong key-insulated signatures in public channel
- The random fault model
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4364574)