Cargando…

Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings /

In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others. Cryptosystems are inherently computationally comple...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Breveglieri, Luca (Editor ), Koren, Israel (Editor ), Naccache, David (Editor ), Seifert, Jean-Pierre (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 4236
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Attacks on Public Key Systems
  • Is It Wise to Publish Your Public RSA Keys?
  • Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered
  • Attacking Right-to-Left Modular Exponentiation with Timely Random Faults
  • Sign Change Fault Attacks on Elliptic Curve Cryptosystems
  • Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
  • Protection of Public Key Systems
  • Blinded Fault Resistant Exponentiation
  • Incorporating Error Detection in an RSA Architecture
  • Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation
  • Attacks on and Protection of Symmetric Key Systems
  • Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
  • A Fault Attack Against the FOX Cipher Family
  • Fault Based Collision Attacks on AES
  • An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers
  • Models for Fault Attacks on Cryptographic Devices
  • An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices
  • Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
  • A Comparative Cost/Security Analysis of Fault Attack Countermeasures
  • Fault-Resistant Arithmetic for Cryptography
  • Non-linear Residue Codes for Robust Public-Key Arithmetic
  • Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
  • Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
  • Fault Attacks and Other Security Threats
  • DPA on Faulty Cryptographic Hardware and Countermeasures
  • Fault Analysis of DPA-Resistant Algorithms
  • Java Type Confusion and Fault Attacks.