User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

DSA signature scheme immune to the fault cryptanalysis

  1. Anderson, R.J., Kuhn, M.G.: Tamper Resistance - a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 18–21 (1996)
  2. Aumüller C., Bier P., Fischer W., Hofreiter P., Seifert J.-P., Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.260-275, 10.1007/3-540-36400-5_20
  3. Bao F., Deng R. H., Han Y., Jeng A., Narasimhalu A. D., Ngair T., Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, Security Protocols (1998) ISBN:9783540640400 p.115-124, 10.1007/bfb0028164
  4. Biham Eli, Shamir Adi, Differential fault analysis of secret key cryptosystems, Advances in Cryptology — CRYPTO '97 (1997) ISBN:9783540633846 p.513-525, 10.1007/bfb0052259
  5. Blmer, J., Otto, M., Seifert, J.-P.: A New CRT-RSA Algorithm Secure Against Bellcore Attacks. In: Proc. ACM Computer and Communications Security 2003 (ACM CCS 2003), pp. 311–320. ACM Press, New York (2003)
  6. Boneh Dan, DeMillo Richard A., Lipton Richard J., On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology — EUROCRYPT ’97 (1997) ISBN:9783540629757 p.37-51, 10.1007/3-540-69053-0_4
  7. Boneh, D., Venkatesan, R.: Rounding in Lattices and Its Cryptographic Applications. In: SODA: ACM-SIAM Symposium on Discrete Algorithms (A Conference on Theoretical, Experimental Analysis of Discrete Algorithms), pp. 675–681 (1997)
  8. Breveglieri L., Koren I., Maistri P., Ravasio M., Incorporating Error Detection in an RSA Architecture, Lecture Notes in Computer Science (2006) ISBN:9783540462507 p.71-79, 10.1007/11889700_7
  9. Czapski, M., Nikodem, M.: Error Correction Procedures for Advanced Encryption Standard. In: Int. Workshop on Coding and Cryptography (WCC 2007), April 16-20, 2007, pp. 89–98. INRIA (2007)
  10. Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S., ArXiv Computer Science e-prints (January 2003)
  11. Giraud Christophe, Knudsen Erik W., Fault Attacks on Signature Schemes, Information Security and Privacy (2004) ISBN:9783540223795 p.478-491, 10.1007/978-3-540-27800-9_41
  12. Joye Marc, Lenstra Arjen K., Quisquater Jean-Jacques, Chinese Remaindering Based Cryptosystems in the Presence of Faults, 10.1007/s001459900055
  13. Karpovsky, M., Kulikowski, K.J., Taubin, A.: A Differential Fault Analysis Attack Resistant Architecture of the Advanced Encryption Standard. In: Proceedings of CARDIS 2004, pp. 177–192. Kluwer, Dordrecht (2004)
  14. Karri R., Wu K., Mishra P., Yongkook Kim, Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers, 10.1109/tcad.2002.804378
  15. Kim Chong Hee, Quisquater Jean-Jacques, Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures, Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems (2007) ISBN:9783540723530 p.215-228, 10.1007/978-3-540-72354-7_18
  16. Kömmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: USENIX Workshop on Smartcard Technology - Smartcard 1999, USENIX Association, pp. 9–20 (1999)
  17. Naccache David, Nguyên Phong Q., Tunstall Michael, Whelan Claire, Experimenting with Faults, Lattices and the DSA, Public Key Cryptography - PKC 2005 (2005) ISBN:9783540244547 p.16-28, 10.1007/978-3-540-30580-4_3
  18. Nguyen, Shparlinski, The Insecurity of the Digital Signature Algorithm with Partially Known Nonces, 10.1007/s00145-002-0021-3
  19. Rosa, T.: Lattice-based Fault Attacks on DSA - Another Possible Strategy. In: Proceedings of the conference Security and Protection of Information 2005, Brno, Czech Republic, 3-5 May 2005, pp. 91–96 (2005)
  20. Sung-Ming Yen, Joye M., Checking before output may not be enough against fault-based cryptanalysis, 10.1109/12.869328
  21. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon, RSA speedup with chinese remainder theorem immune against hardware fault cryptanalysis, 10.1109/tc.2003.1190587
  22. Yen Sung-Ming, Kim Dongryeol, Moon SangJae, Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection, Lecture Notes in Computer Science (2006) ISBN:9783540462507 p.53-61, 10.1007/11889700_5
Bibliographic reference Nikodem, M.. DSA signature scheme immune to the fault cryptanalysis.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 61-73
Permanent URL http://hdl.handle.net/2078.1/67658