User menu

Secure implementation of the stern authentication and signature schemes for low-resource devices

Bibliographic reference Cayrel, P.-L. ; Gaborit, P. ; ProufT, E.. Secure implementation of the stern authentication and signature schemes for low-resource devices.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 191-205
Permanent URL http://hdl.handle.net/2078.1/67649
  1. Fiat Amos, Shamir Adi, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology — CRYPTO’ 86 ISBN:9783540180470 p.186-194, 10.1007/3-540-47721-7_12
  2. Gaborit Philippe, Girault Marc, Lightweight code-based identification and signature, 10.1109/isit.2007.4557225
  3. Goubin Louis, Patarin Jacques, DES and Differential Power Analysis The “Duplication” Method, Cryptographic Hardware and Embedded Systems (1999) ISBN:9783540666462 p.158-172, 10.1007/3-540-48059-5_15
  4. Lemke Kerstin, Schramm Kai, Paar Christof, DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.205-219, 10.1007/978-3-540-28632-5_15
  5. Luby M, Rackoff C, Pseudo-random permutation generators and cryptographic composition, 10.1145/12130.12167
  6. Luby Michael, Rackoff Charles, How to Construct Pseudorandom Permutations from Pseudorandom Functions, 10.1137/0217022
  7. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks – Revealing the Secrets of Smartcards. Springer, Heidelberg (2007)
  8. McEvoy Robert, Tunstall Michael, Murphy Colin C., Marnane William P., Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures, Information Security Applications (2007) ISBN:9783540775348 p.317-332, 10.1007/978-3-540-77535-5_23
  9. Oswald Elisabeth, Schramm Kai, An Efficient Masking Scheme for AES Software Implementations, Information Security Applications (2006) ISBN:9783540310129 p.292-305, 10.1007/11604938_23
  10. Patarin Jacques, How to Construct Pseudorandom and Super Pseudorandom Permutations from One Single Pseudorandom Function, Advances in Cryptology — EUROCRYPT’ 92 ISBN:9783540564133 p.256-266, 10.1007/3-540-47555-9_22
  11. Petit, C., Standaert, F.-X., Pereira, O., Malkin, T.G., Yung, M.: A Block Cipher based PRNG Secure Against Side-Channel Key Recovery, http://eprint.iacr.org/2007/356.pdf
  12. Pieprzyk Josef, How to Construct Pseudorandom Permutations from Single Pseudorandom Functions, Advances in Cryptology — EUROCRYPT ’90 (1991) ISBN:9783540535874 p.140-150, 10.1007/3-540-46877-3_12
  13. Preneel, B.: Hash functions - present state of art. ECRYPT Report (2005)
  14. Prouff Emmanuel, Rivain Matthieu, A Generic Method for Secure SBox Implementation, Information Security Applications (2007) ISBN:9783540775348 p.227-244, 10.1007/978-3-540-77535-5_17
  15. Stern Jacques, A new identification scheme based on syndrome decoding, Advances in Cryptology — CRYPTO’ 93 ISBN:9783540577669 p.13-21, 10.1007/3-540-48329-2_2