Fault Injection and a Timing Channel on an Analysis Technique
暂无分享,去创建一个
[1] Richard Spillman,et al. Use of a genetic algorithm in the crypt-analysis of simple substitution ciphers , 1993 .
[2] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[3] Robert A. J. Matthews,et al. The Use of Genetic Algorithms in Cryptanalysis , 1993, Cryptologia.
[4] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[5] Jacques Stern,et al. A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.
[6] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[7] Adi Shamir,et al. An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract) , 1989, CRYPTO.
[8] J. Lutton,et al. Thermostatistical persistency: A powerful improving concept for simulated annealing algorithms , 1995 .
[9] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[10] Reihaneh Safavi-Naini,et al. Automated Cryptanalysis of Transposition Ciphers , 1994, Comput. J..
[11] Willi Meier,et al. Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem , 1999, EUROCRYPT.
[12] Jacques Stern,et al. Designing Identification Schemes with Keys of Short Size , 1994, CRYPTO.
[13] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[14] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[15] Reihaneh Safavi-Naini,et al. Automated Cryptanalysis of Substitution Ciphers , 1993, Cryptologia.
[16] David Pointcheval,et al. A New Identification Scheme Based on the Perceptrons Problem , 1995, EUROCRYPT.