Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
暂无分享,去创建一个
[1] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[2] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[3] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[4] Elisabeth Oswald,et al. Template Attacks on ECDSA , 2009, WISA.
[5] Guillaume Fumaroli,et al. Blinded Fault Resistant Exponentiation , 2006, FDTC.
[6] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[7] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[10] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[11] Marc Joye,et al. The Montgomery Powering Ladder , 2002, CHES.
[12] Elisabeth Oswald,et al. Practical Template Attacks , 2004, WISA.
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[15] Israel Koren,et al. Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings , 2006, FDTC.
[16] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[17] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[18] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[19] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.