scientific article; zbMATH DE number 1088257
From MaRDI portal
Publication:4364574
Recommendations
Cited in
(only showing first 100 items - show all)- Attacking block ciphers
- On the impossibility of cryptography with tamperable randomness
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Fully leakage-resilient signatures
- Fault attack on the balanced shrinking generator
- Public key encryption resilient to leakage and tampering attacks
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Side-channel resistant crypto for less than 2,300 GE
- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults?
- Differential fault attack on AES using maximum four bytes faulty ciphertexts
- Differential fault attack on Espresso
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- Learn from your faults: leakage assessment in fault attacks using deep learning
- Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks
- Strongly leakage resilient authenticated key exchange, revisited
- Fault analysis of the NTRUSign digital signature scheme
- Language Modeling and Encryption on Packet Switched Networks
- Differential fault attack on Montgomery ladder and in the presence of scalar randomization
- Fault analysis of Trivium
- Fault analysis of Kuznyechik
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
- A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
- On the structural weakness of the GGHN stream cipher
- A white-box speck implementation using self-equivalence encodings
- Non-malleable functions and their applications
- Two improved multiple-differential collision attacks
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
- A Leakage-Resilient Mode of Operation
- Locally decodable and updatable non-malleable codes and their applications
- Relations between robustness and RKA security under public-key encryption
- Fast Software Encryption
- Differential fault attack on Rocca
- Differential fault attack on lightweight block cipher PIPO
- Continuously non-malleable codes against bounded-depth tampering
- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
- Differential Behavioral Analysis
- A new class of security oriented error correcting robust codes
- Fault analysis of grain-128 by targeting NFSR
- A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.
- Information-combining differential fault attacks on DEFAULT
- \textsc{scope}: on the side channel vulnerability of releasing unverified plaintexts
- SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA
- Statistical fault attacks on nonce-based authenticated encryption schemes
- A New Attack on the LEX Stream Cipher
- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable
- Fault-based analysis of flexible ciphers
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Combined fault and leakage resilience: composability, constructions and compiler
- Ciphertext-only fault attacks on PRESENT
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- Differential fault analysis of DES
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Side channel cryptanalysis of product ciphers
- On the importance of eliminating errors in cryptographic computations
- Bug Attacks
- White-box cryptography: don't forget about grey-box attacks
- A stealthy hardware Trojan based on a statistical fault attack
- Efficiently testable circuits without conductivity
- Differential faultt attack on \texttt{DEFAULT}
- Differential fault analysis of AES: toward reducing number of faults
- Strong authenticated key exchange with auxiliary inputs
- scientific article; zbMATH DE number 1504819 (Why is no real title available?)
- Signature schemes secure against hard-to-invert leakage
- Theoretical differential fault attacks on FLIP and FiLIP
- FIMA: fault intensity map analysis
- Efficient public-key cryptography with bounded leakage and tamper resilience
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Applied Cryptography and Network Security
- Differential Propagation Analysis of Keccak
- Related-key almost universal hash functions: definitions, constructions and applications
- Polar differential power attacks and evaluation
- Forced Independent Optimized Implementation of 4-Bit S-Box
- An Improved Fault Based Attack of the Advanced Encryption Standard
- Differential fault analysis on block cipher SEED
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Differential fault analysis of Sosemanuk
- \textsf{ISAP+}: \textsf{ISAP} with fast authentication
- DEFAULT: cipher level resistance against differential fault attack
- Combined attack on CRT-RSA. Why public verification must not be public?
- Differential Fault Analysis on DES Middle Rounds
- Quantitative fault injection analysis
- Fault Analysis Study of IDEA
- scientific article; zbMATH DE number 2079917 (Why is no real title available?)
- Perturbating RSA Public Keys: An Improved Attack
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- scientific article; zbMATH DE number 1882021 (Why is no real title available?)
- Error detection and error correction procedures for the advanced encryption standard
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- Proving SIFA protection of masked redundant circuits
- Differential fault analysis on KeeLoq and SHACAL-1
- Preventing fault attacks using fault randomization with a case study on AES
- Leakage resilient strong key-insulated signatures in public channel
- Design of fault-resilient S-boxes for AES-like block ciphers
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
- The random fault model
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
- Improved fault analysis on the block cipher SPECK by injecting faults in the same round
- scientific article; zbMATH DE number 2086706 (Why is no real title available?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4364574)