Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
暂无分享,去创建一个
Werner Schindler | Jean-Jacques Quisquater | François Koeune | J. Quisquater | F. Koeune | W. Schindler
[1] Hermann Witting,et al. Mathematische Statistik II , 1985 .
[2] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[3] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[4] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Don Coppersmith,et al. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities , 1997, Journal of Cryptology.
[7] J. Quisquater,et al. A Practical Implementation of the Timing Attack , 1998, CARDIS.
[8] Bruce Schneier,et al. Smart Card Research and Applications , 1998, Lecture Notes in Computer Science.
[9] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.
[10] Werner Schindler,et al. A Timing Attack against RSA with the Chinese Remainder Theorem , 2000, CHES.
[11] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[12] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[13] Schindler Werner. OPTIMIZED TIMING ATTACKS AGAINST PUBLIC KEY CRYPTOSYSTEMS , 2002 .