Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption
暂无分享,去创建一个
JaeCheol Ha | Sung-Ming Yen | Sang-Jae Moon | Wei-Chih Lien | Sung-Ming Yen | S. Moon | JaeCheol Ha | Wei-Chih Lien
[1] Frédéric Valette,et al. The Doubling Attack - Why Upwards Is Better than Downwards , 2003, CHES.
[2] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[5] J. Quisquater,et al. Fast decipherment algorithm for RSA public-key cryptosystem , 1982 .
[6] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] Tsuyoshi Takagi,et al. Zero-Value Point Attacks on Elliptic Curve Cryptosystem , 2003, ISC.
[9] Atsuko Miyaji,et al. Efficient Countermeasures against RPA, DPA, and SPA , 2004, CHES.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[12] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[13] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[14] Louis Goubin,et al. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems , 2003, Public Key Cryptography.
[15] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[16] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[17] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[18] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[19] Christof Paar,et al. A New Class of Collision Attacks and Its Application to DES , 2003, FSE.
[20] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2003 , 2003, Lecture Notes in Computer Science.
[21] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.