scientific article; zbMATH DE number 1088257
From MaRDI portal
Publication:4364574
zbMath0886.94010MaRDI QIDQ4364574
Publication date: 12 May 1998
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (90)
Relations between robustness and RKA security under public-key encryption ⋮ A stealthy hardware Trojan based on a statistical fault attack ⋮ Non-malleable functions and their applications ⋮ Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor ⋮ Fault attack on the balanced shrinking generator ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Memory leakage-resilient secret sharing schemes ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults? ⋮ \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study ⋮ On the structural weakness of the GGHN stream cipher ⋮ Proving SIFA protection of masked redundant circuits ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Fully leakage-resilient signatures ⋮ Preventing Fault Attacks Using Fault Randomization with a Case Study on AES ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Information-combining differential fault attacks on DEFAULT ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA ⋮ Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers ⋮ Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks ⋮ On the impossibility of cryptography with tamperable randomness ⋮ A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model ⋮ All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks ⋮ FIPAC: thwarting fault- and software-induced control-flow attacks with ARM pointer authentication ⋮ Learn from your faults: leakage assessment in fault attacks using deep learning ⋮ Fault Attacks on Public Key Elements: Application to DLP-Based Schemes ⋮ Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Combined fault and leakage resilience: composability, constructions and compiler ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks ⋮ DEFAULT: cipher level resistance against differential fault attack ⋮ Differential fault attack on Espresso ⋮ Differential fault attack on Montgomery ladder and in the presence of scalar randomization ⋮ \textsf{ISAP+}: \textsf{ISAP} with fast authentication ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ Differential fault attack on AES using maximum four bytes faulty ciphertexts ⋮ Differential fault analysis on SMS4 using a single fault ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Fault analysis of the NTRUSign digital signature scheme ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Polar differential power attacks and evaluation ⋮ Differential fault analysis on block cipher SEED ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Two improved multiple-differential collision attacks ⋮ Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje ⋮ Fault analysis of Trivium ⋮ Serpent: A New Block Cipher Proposal ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ Анализ шифра Кузнечик методом искажений ⋮ Fault Analysis of Grain-128 by Targeting NFSR ⋮ Differential Fault Analysis of Sosemanuk ⋮ An Improved Differential Fault Analysis on AES-256 ⋮ Probabilistic signature based generalized framework for differential fault analysis of stream ciphers ⋮ Combined Attack on CRT-RSA ⋮ Elliptic curve cryptosystems in the presence of permanent and transient faults ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Private Circuits II: Keeping Secrets in Tamperable Circuits ⋮ Language Modeling and Encryption on Packet Switched Networks ⋮ Differential fault analysis of AES: toward reducing number of faults ⋮ On two DES implementations secure against differential power analysis in smart-cards ⋮ A New Attack on the LEX Stream Cipher ⋮ Continuously non-malleable codes with split-state refresh ⋮ Design of fault-resilient S-boxes for AES-like block ciphers ⋮ Fault Analysis Study of IDEA ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts ⋮ Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable ⋮ Securing RSA against Fault Analysis by Double Addition Chain Exponentiation ⋮ Error detection and error correction procedures for the advanced encryption standard ⋮ A Leakage-Resilient Mode of Operation ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Fault template attacks on block ciphers exploiting fault propagation ⋮ An Improved Fault Based Attack of the Advanced Encryption Standard ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks ⋮ Leakage Resilient Strong Key-Insulated Signatures in Public Channel ⋮ A new class of security oriented error correcting robust codes ⋮ Perturbating RSA Public Keys: An Improved Attack ⋮ Strongly leakage resilient authenticated key exchange, revisited ⋮ A white-box speck implementation using self-equivalence encodings ⋮ Side channel cryptanalysis of product ciphers ⋮ Differential fault attack on Rocca ⋮ Differential fault attack on lightweight block cipher PIPO ⋮ Persistent fault analysis with few encryptions
This page was built for publication: