The SCEAS System
Navigation Menu

Conferences in DBLP

(fdtc)
2006 (conf/fdtc/2006)

  1. Shay Gueron, Jean-Pierre Seifert
    Is It Wise to Publish Your Public RSA Keys? [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:1-12 [Conf]
  2. Johannes Blömer, Martin Otto 0002
    Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:13-23 [Conf]
  3. Michele Boreale
    Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:24-35 [Conf]
  4. Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert
    Sign Change Fault Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:36-52 [Conf]
  5. Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon
    Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:53-61 [Conf]
  6. Guillaume Fumaroli, David Vigilant
    Blinded Fault Resistant Exponentiation. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:62-70 [Conf]
  7. Luca Breveglieri, Israel Koren, Paolo Maistri, M. Ravasio
    Incorporating Error Detection in an RSA Architecture. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:71-79 [Conf]
  8. Shay Gueron
    Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:80-87 [Conf]
  9. Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel
    Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:88-97 [Conf]
  10. Luca Breveglieri, Israel Koren, Paolo Maistri
    A Fault Attack Against the FOX Cipher Family. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:98-105 [Conf]
  11. Johannes Blömer, Volker Krummel
    Fault Based Collision Attacks on AES. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:106-120 [Conf]
  12. Myeong-Hyeon Lee, Yoon-Hwa Choi
    An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:121-130 [Conf]
  13. Kerstin Lemke-Rust, Christof Paar
    An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:131-143 [Conf]
  14. Alfonso De Gregorio
    Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:144-158 [Conf]
  15. Tal Malkin, François-Xavier Standaert, Moti Yung
    A Comparative Cost/Security Analysis of Fault Attack Countermeasures. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:159-172 [Conf]
  16. Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky
    Non-linear Residue Codes for Robust Public-Key Arithmetic. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:173-184 [Conf]
  17. Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin
    Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:185-195 [Conf]
  18. Gunnar Gaubatz, Berk Sunar
    Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:196-210 [Conf]
  19. Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin
    DPA on Faulty Cryptographic Hardware and Countermeasures. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:211-222 [Conf]
  20. Frederic Amiel, Christophe Clavier, Michael Tunstall
    Fault Analysis of DPA-Resistant Algorithms. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:223-236 [Conf]
  21. Olli Vertanen
    Java Type Confusion and Fault Attacks. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:237-251 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002