Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant devices. The attack makes use of transient faults and seems applicable to many types of PKCs. In particular, we show how to attack the RSA, the E1Gamal signature scheme, the Schnorr signature scheme, a...
Saved in:
Main Authors: | BAO, Feng, DENG, Robert H., HAN, Y., JENG, A., NARASIMHALU, Arcot Desai, NGAIR, T. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2005
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3723 https://ink.library.smu.edu.sg/context/sis_research/article/4725/viewcontent/10.1007_2FBFb0028164__1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Authenticated key exchange under bad randomness
by: YANG, Guomin, et al.
Published: (2011) -
Strongly secure certificateless key exchange without pairing
by: YANG, Guomin, et al.
Published: (2011) -
n PAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
by: WAN, Zhiguo, et al.
Published: (2009) -
Leakage resilient authenticated key exchange secure in the auxiliary input model
by: YANG, Guomin, et al.
Published: (2013) -
IMPROVED AUTHENTICATION PROTOCOL FOR MOBILE IP
by: GAO QING
Published: (2019)