On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
暂无分享,去创建一个
[1] Arjen K. Lenstra. Memo on RSA signature generation in the presence of faults , 1996 .
[2] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[3] Amos Fiat,et al. Zero-knowledge proofs of identity , 1988, Journal of Cryptology.
[4] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[5] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[6] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[7] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[8] Amos Fiat,et al. Zero Knowledge Proofs of Identity , 1987, STOC.
[9] Marc Joye,et al. Attacks on systems using Chinese remaindering , 1996 .
[10] Manuel Blum,et al. Program result-checking: a theory of testing meets a test of theory , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[11] Moti Yung,et al. Witness-based cryptographic program checking and robust function sharing , 1996, STOC '96.
[12] Robert H. Deng,et al. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults , 1997, Security Protocols Workshop.
[13] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[14] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .