共 58 条
[1]
Aumuller Christian, Bier Peter, Fischer Wieland, Hofreiter Peter, Seifert Jean-Pierre, Fault attacks on RSA with CRT: concrete results and practical countermeasures, Cryptographic Hardware and Embedded Systems-CHES 2002, 4th International Workshop, pp. 260-275, (2002)
[2]
Anderson Ross J., Kuhn Markus G., Low cost attacks on tamper resistant devices, Security Protocols, 5th International Workshop, pp. 125-136, (1997)
[3]
Barenghi Alessandro, Bertoni Guido, Breveglieri Luca, Pellicioli Mauro, Pelosi Gerardo, Low voltage fault attacks to AES, HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 7-12, (2010)
[4]
Barenghi Alessandro, Bertoni Guido, Breveglieri Luca, Pellicioli Mauro, Pelosi Gerardo, Low voltage fault attacks to AES and RSA on general purpose processors, IACR Cryptology ePrint Archive, 2010, (2010)
[5]
Barenghi Alessandro, Breveglieri Luca, Koren Israel, Naccache David, Fault injection attacks on cryptographic devices: Theory, practice, and coun-termeasures, Proceedings of the IEEE, 100, 11, pp. 3056-3076, (2012)
[6]
Barenghi Alessandro, Bertoni Guido, Parrinello Emanuele, Pelosi Gerardo, Low voltage fault attacks on the RSA cryptosystem, Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, pp. 23-31, (2009)
[7]
Bar-El Hagai, Choukri Hamid, Naccache David, Tunstall Michael, Whelan Claire, The sorcerer’s apprentice guide to fault attacks, IACR Cryptology ePrint Archive, (2004)
[8]
Brier Eric, Clavier Christophe, Olivier Francis, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop Cambridge, pp. 16-29, (2004)
[9]
Backes Michael, Durmuth Markus, Gerling Sebastian, Pinkal Manfred, Sporleder Caroline, Acoustic side-channel attacks on printers, 19th USENIX Security Symposium, pp. 307-322, (2010)
[10]
Boneh Dan, DeMillo Richard A., Lipton Richard J., On the importance of checking cryptographic protocols for faults (extended abstract), Advances in Cryptology-EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, pp. 37-51, (1997)