咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 7 篇 电气工程
    • 7 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电子科学与技术(可...

主题

  • 8 篇 fault-based cryp...
  • 4 篇 cryptography
  • 2 篇 data security
  • 2 篇 fault injection
  • 2 篇 public key crypt...
  • 2 篇 digital arithmet...
  • 2 篇 elliptic curve c...
  • 2 篇 concurrent error...
  • 2 篇 concurrent error...
  • 1 篇 space complexiti...
  • 1 篇 exponentiation
  • 1 篇 side-channel inf...
  • 1 篇 fault-tolerant d...
  • 1 篇 finite-field ari...
  • 1 篇 fault diagnosis
  • 1 篇 trm
  • 1 篇 polynomial basis...
  • 1 篇 computational co...
  • 1 篇 cryptosystems
  • 1 篇 arithmetic codes

机构

  • 3 篇 ching yun univ d...
  • 2 篇 univ passau d-94...
  • 1 篇 ching yun univ d...
  • 1 篇 univ florence di...
  • 1 篇 natl cent univ d...
  • 1 篇 minghsin univ sc...
  • 1 篇 lunghwa univ sci...
  • 1 篇 univ massachuset...
  • 1 篇 natl taipei univ...
  • 1 篇 natl cheng kung ...
  • 1 篇 feng chia univ d...
  • 1 篇 natl taipei univ...
  • 1 篇 lunghwa univ dep...
  • 1 篇 natl taiwan norm...
  • 1 篇 gemplus card int...

作者

  • 2 篇 jovanovic philip...
  • 2 篇 lee c. -y.
  • 2 篇 polian ilia
  • 2 篇 chiou c. w.
  • 1 篇 chuang t. -p.
  • 1 篇 lee yc
  • 1 篇 liang w. -y.
  • 1 篇 lin s. -s.
  • 1 篇 tu fk
  • 1 篇 lin j. -m.
  • 1 篇 joye m
  • 1 篇 huang w-t
  • 1 篇 chang c. h.
  • 1 篇 chou f. h.
  • 1 篇 laih cs
  • 1 篇 chiou c. wun
  • 1 篇 yen sm
  • 1 篇 chang h. w.
  • 1 篇 burleson wayne
  • 1 篇 boreale michele

语言

  • 8 篇 英文
检索条件"主题词=fault-based cryptanalysis"
8 条 记 录,以下是1-10 订阅
排序:
Checking before output may not be enough against fault-based cryptanalysis
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2000年 第9期49卷 967-970页
作者: Yen, SM Joye, M Natl Cent Univ Dept Comp Sci & Informat Engn LCIS Chungli 320 Taiwan Gemplus Card Int Card Secur Grp F-13881 Gemenos France
In order to avoid fault-based attacks on cryptographic security modules (e.g., smart-cards), some authors suggest that the computation results should be checked for faults before being transmitted. In this paper, we d... 详细信息
来源: 评论
Concurrent error detection in semi-systolic dual basis multiplier over GF(2m) using self-checking alternating logic
收藏 引用
IET CIRCUITS DEVICES & SYSTEMS 2010年 第5期4卷 382-391页
作者: Chiou, C. W. Liang, W. -Y. Chang, H. W. Lin, J. -M. Lee, C. -Y. Ching Yun Univ Dept Comp Sci & Informat Engn Chungli 320 Taiwan Natl Taipei Univ Technol Dept Comp Sci & Informat Engn Taipei 106 Taiwan Feng Chia Univ Dept Informat Engn & Comp Sci Taichung 407 Taiwan Lunghwa Univ Sci & Technol Dept Comp Informat & Network Engn Tao Yuan 333 Taiwan
Multiplication is one of the most important finite field arithmetic operations in cryptographic computations. Recently, the attacks of fault-based cryptanalysis have been a critical threat to both symmetrical and asym... 详细信息
来源: 评论
On the implementation of public key cryptosystems against fault-based attacks
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 1999年 第6期E82A卷 1082-1089页
作者: Laih, CS Tu, FK Lee, YC Natl Cheng Kung Univ Dept Elect Engn Commun Lab Tainan 70101 Taiwan
Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resis... 详细信息
来源: 评论
Concurrent error detection and correction in a polynomial basis multiplier over GF(2m)
收藏 引用
IET INFORMATION SECURITY 2010年 第3期4卷 111-124页
作者: Huang, W-T Chang, C. H. Chiou, C. W. Chou, F. H. Minghsin Univ Sci & Technol Dept Comp Sci & Informat Engn Hsinchu 30401 Taiwan Natl Taipei Univ Technol Inst Comp & Commun Taipei 106 Taiwan Ching Yun Univ Dept Comp Sci & Informat Engn Chungli 320 Taiwan Ching Yun Univ Dept Elect Engn Chungli 320 Taiwan
Finite-field arithmetic has been widely used to speed up the encryption and decryption processes in many cryptosystems, especially elliptic curve cryptosystems. Regular finite-field arithmetic structures are suitable ... 详细信息
来源: 评论
fault-tolerant Gaussian normal basis multiplier over GF(2m)
收藏 引用
IET INFORMATION SECURITY 2012年 第3期6卷 157-170页
作者: Chuang, T. -P. Chiou, C. Wun Lin, S. -S. Lee, C. -Y. Natl Taiwan Normal Univ Dept Comp Sci & Informat Engn Taipei 116 Taiwan Ching Yun Univ Dept Comp Sci & Informat Engn Chungli 320 Taiwan Lunghwa Univ Dept Comp Informat & Network Engn Gueishan 333 Taoyuan County Taiwan
fault-tolerant design of a finite field multiplier is an efficient method for resisting fault-based cryptanalysis in Elliptic curve cryptosystems. A novel fault-tolerant bit-parallel Gaussian normal basis (GNB) multip... 详细信息
来源: 评论
Attacking right-to-left modular exponentiation with timely random faults
收藏 引用
3rd International Workshop on fault Diagnosis and Tolerance in Cryptography
作者: Boreale, Michele Univ Florence Dipartimento Sistemi & Informat I-50134 Florence Italy
We show that timely induction of random failures can potentially be used to mount very cost effective attacks against smartcards deploying cryptographic schemes based on (right-to-left) modular exponentiation. We intr... 详细信息
来源: 评论
Parametric Trojans for fault-Injection Attacks on Cryptographic Hardware  11
Parametric Trojans for Fault-Injection Attacks on Cryptograp...
收藏 引用
11th Workshop on fault Diagnosis and Tolerance in Cryptography (FDTC)
作者: Kumar, Raghavan Jovanovic, Philipp Burleson, Wayne Polian, Ilia Univ Massachusetts Amherst MA 01002 USA Univ Passau D-94032 Passau Germany
We propose two extremely stealthy hardware Trojans that facilitate fault-injection attacks in cryptographic blocks. The Trojans are carefully inserted to modify the electrical characteristics of predetermined transist... 详细信息
来源: 评论
fault-based Attacks on the Bel-T Block Cipher Family
Fault-based Attacks on the Bel-T Block Cipher Family
收藏 引用
Conference on Design Automation Test in Europe (DATE)
作者: Jovanovic, Philipp Polian, Ilia Univ Passau D-94032 Passau Germany
We present the first fault-based attack on the Bel-T block cipher family which has been adopted recently as a national standard of the Republic of Belarus. Our attack successfully recovers the secret key of the 128-bi... 详细信息
来源: 评论