A Cautionary Note on Weak Implementations of Block Ciphers
暂无分享,去创建一个
[1] Kenneth G. Paterson,et al. Cryptography in Theory and Practice: The Case of Encryption in IPsec , 2006, EUROCRYPT.
[2] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[3] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[4] Charanjit S. Jutla,et al. Encryption Modes with Almost Free Message Integrity , 2001, Journal of Cryptology.
[5] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[6] Joe Kilian,et al. How to Protect DES Against Exhaustive Key Search , 1996, CRYPTO.
[7] Christophe Giraud,et al. DFA on AES , 2004, AES Conference.
[8] Paul C. van Oorschot,et al. White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.
[9] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[10] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[11] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Jean-Pierre Seifert,et al. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) , 2003, Financial Cryptography.
[14] Gary McGraw,et al. Exploiting Software: How to Break Code , 2004 .
[15] Shai Halevi,et al. MARS - a candidate cipher for AES , 1999 .