A formal proof of countermeasures against fault injection attacks on CRT-RSA

P Rauzy, S Guilley - Journal of Cryptographic Engineering, 2014 - Springer
In this article, we describe a methodology that aims at either breaking or proving the security
of CRT-RSA implementations against fault injection attacks. In the specific case-study of the …

Countermeasures against high-order fault-injection attacks on CRT-RSA

P Rauzy, S Guilley - 2014 Workshop on Fault Diagnosis and …, 2014 - ieeexplore.ieee.org
In this paper we study the existing CRT-RSA countermeasures against fault-injection
attacks. In an attempt to classify them we get to achieve deep understanding of how they …

[PDF][PDF] A multi-secret sharing scheme based on the CRT and RSA

X Dong - International Journal of Electronics and Information …, 2015 - ijeie.jalaxy.com.tw
In this paper, we propose to enhance threshold secret sharing schemes based on the
Chinese remainder theorem (CRT) by incorporating the well-known RSA Cryptosystem. In …

Scientific visualization of water quality in the Chesapeake Bay

R Stein, AM Shih, MP Baker, CF Cerco… - … 2000. VIS 2000 (Cat …, 2000 - ieeexplore.ieee.org
This paper describes our experience in designing and building a tool for visualizing the
results of the CE-QUAL-ICM Three-Dimensional Eutrophication Model, as applied to water …

Survey and analysis of security issues on RSA algorithm for digital video data

K Gagneja, J Singh - Journal of Discrete Mathematical Sciences …, 2016 - Taylor & Francis
RSA is an encryption algorithm which is used for remote login session, credit card payment
systems, transport layer security, secure socket layer, pretty good privacy and email security …

Improved Shamir's CRT‐RSA Algorithm: Revisit with the Modulus Chaining Method

S Lee, D Choi, Y Choi - Etri Journal, 2014 - Wiley Online Library
RSA signature algorithms using the Chinese remainder theorem (CRT‐RSA) are
approximately four‐times faster than straightforward implementations of an RSA …

High-level simulation for multiple fault injection evaluation

M Puys, L Riviere, J Bringer, T Le - International Workshop on Data Privacy …, 2014 - Springer
Faults injection attacks have become a hot topic in the domain of smartcards. This work
exposes a source code-base simulation approach designed to evaluate the robustness of …

Using modular extension to provably protect Edwards curves against fault attacks

M Dugardin, S Guilley, M Moreau, Z Najm… - Journal of Cryptographic …, 2017 - Springer
Fault injection attacks are a real-world threat to cryptosystems, in particular, asymmetric
cryptography. In this paper, we focus on countermeasures which guarantee the integrity of …

[PDF][PDF] Using modular extension to provably protect ECC against fault attacks

P Rauzy, M Moreau, S Guilley, Z Najm - 2015 - Citeseer
Fault injection attacks are a real-world threat to cryptosystems, in particular asymmetric
cryptography. In this paper, we focus on countermeasures which guarantee the integrity of …

[PDF][PDF] Research Article A Survey and Analysis of Security Issues on RSA Algorithm

K Gagneja, KJ Singh - … Journal of Applied Sciences, Engineering and …, 2015 - academia.edu
RSA is used for remote login session, multimedia, credit card payment systems and email
security. Key lengths are getting longer in RSA at an exponential phase without solving …