Sciweavers

FSE
2006
Springer
104views Cryptology» more  FSE 2006»
14 years 7 days ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
14 years 7 days ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
FDTC
2006
Springer
91views Cryptology» more  FDTC 2006»
14 years 7 days ago
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered
Johannes Blömer, Martin Otto 0002
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
14 years 7 days ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...
FDTC
2006
Springer
103views Cryptology» more  FDTC 2006»
14 years 7 days ago
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors
Yannick Monnet, Marc Renaudin, Régis Leveug...
FDTC
2006
Springer
100views Cryptology» more  FDTC 2006»
14 years 7 days ago
A Comparative Cost/Security Analysis of Fault Attack Countermeasures
Tal Malkin, François-Xavier Standaert, Moti...
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
14 years 7 days ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
14 years 7 days ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...