Conferences in DBLP
(fdtc) 2006 (conf/fdtc/2006)
Shay Gueron , Jean-Pierre Seifert Is It Wise to Publish Your Public RSA Keys? [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:1-12 [Conf ] Johannes Blömer , Martin Otto 0002 Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:13-23 [Conf ] Michele Boreale Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:24-35 [Conf ] Johannes Blömer , Martin Otto 0002 , Jean-Pierre Seifert Sign Change Fault Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:36-52 [Conf ] Sung-Ming Yen , Dongryeol Kim , Sang-Jae Moon Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:53-61 [Conf ] Guillaume Fumaroli , David Vigilant Blinded Fault Resistant Exponentiation. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:62-70 [Conf ] Luca Breveglieri , Israel Koren , Paolo Maistri , M. Ravasio Incorporating Error Detection in an RSA Architecture. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:71-79 [Conf ] Shay Gueron Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:80-87 [Conf ] Yannick Monnet , Marc Renaudin , Régis Leveugle , Christophe Clavier , Pascal Moitrel Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:88-97 [Conf ] Luca Breveglieri , Israel Koren , Paolo Maistri A Fault Attack Against the FOX Cipher Family. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:98-105 [Conf ] Johannes Blömer , Volker Krummel Fault Based Collision Attacks on AES. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:106-120 [Conf ] Myeong-Hyeon Lee , Yoon-Hwa Choi An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:121-130 [Conf ] Kerstin Lemke-Rust , Christof Paar An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:131-143 [Conf ] Alfonso De Gregorio Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:144-158 [Conf ] Tal Malkin , François-Xavier Standaert , Moti Yung A Comparative Cost/Security Analysis of Fault Attack Countermeasures. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:159-172 [Conf ] Gunnar Gaubatz , Berk Sunar , Mark G. Karpovsky Non-linear Residue Codes for Robust Public-Key Arithmetic. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:173-184 [Conf ] Konrad J. Kulikowski , Mark G. Karpovsky , Alexander Taubin Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:185-195 [Conf ] Gunnar Gaubatz , Berk Sunar Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:196-210 [Conf ] Konrad J. Kulikowski , Mark G. Karpovsky , Alexander Taubin DPA on Faulty Cryptographic Hardware and Countermeasures. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:211-222 [Conf ] Frederic Amiel , Christophe Clavier , Michael Tunstall Fault Analysis of DPA-Resistant Algorithms. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:223-236 [Conf ] Olli Vertanen Java Type Confusion and Fault Attacks. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:237-251 [Conf ]