A formal proof of countermeasures against fault injection attacks on CRT-RSA
In this article, we describe a methodology that aims at either breaking or proving the security
of CRT-RSA implementations against fault injection attacks. In the specific case-study of the …
of CRT-RSA implementations against fault injection attacks. In the specific case-study of the …
Countermeasures against high-order fault-injection attacks on CRT-RSA
In this paper we study the existing CRT-RSA countermeasures against fault-injection
attacks. In an attempt to classify them we get to achieve deep understanding of how they …
attacks. In an attempt to classify them we get to achieve deep understanding of how they …
[PDF][PDF] A multi-secret sharing scheme based on the CRT and RSA
X Dong - International Journal of Electronics and Information …, 2015 - ijeie.jalaxy.com.tw
In this paper, we propose to enhance threshold secret sharing schemes based on the
Chinese remainder theorem (CRT) by incorporating the well-known RSA Cryptosystem. In …
Chinese remainder theorem (CRT) by incorporating the well-known RSA Cryptosystem. In …
Scientific visualization of water quality in the Chesapeake Bay
R Stein, AM Shih, MP Baker, CF Cerco… - … 2000. VIS 2000 (Cat …, 2000 - ieeexplore.ieee.org
This paper describes our experience in designing and building a tool for visualizing the
results of the CE-QUAL-ICM Three-Dimensional Eutrophication Model, as applied to water …
results of the CE-QUAL-ICM Three-Dimensional Eutrophication Model, as applied to water …
Survey and analysis of security issues on RSA algorithm for digital video data
RSA is an encryption algorithm which is used for remote login session, credit card payment
systems, transport layer security, secure socket layer, pretty good privacy and email security …
systems, transport layer security, secure socket layer, pretty good privacy and email security …
Improved Shamir's CRT‐RSA Algorithm: Revisit with the Modulus Chaining Method
S Lee, D Choi, Y Choi - Etri Journal, 2014 - Wiley Online Library
RSA signature algorithms using the Chinese remainder theorem (CRT‐RSA) are
approximately four‐times faster than straightforward implementations of an RSA …
approximately four‐times faster than straightforward implementations of an RSA …
High-level simulation for multiple fault injection evaluation
Faults injection attacks have become a hot topic in the domain of smartcards. This work
exposes a source code-base simulation approach designed to evaluate the robustness of …
exposes a source code-base simulation approach designed to evaluate the robustness of …
Using modular extension to provably protect Edwards curves against fault attacks
Fault injection attacks are a real-world threat to cryptosystems, in particular, asymmetric
cryptography. In this paper, we focus on countermeasures which guarantee the integrity of …
cryptography. In this paper, we focus on countermeasures which guarantee the integrity of …
[PDF][PDF] Using modular extension to provably protect ECC against fault attacks
Fault injection attacks are a real-world threat to cryptosystems, in particular asymmetric
cryptography. In this paper, we focus on countermeasures which guarantee the integrity of …
cryptography. In this paper, we focus on countermeasures which guarantee the integrity of …
[PDF][PDF] Research Article A Survey and Analysis of Security Issues on RSA Algorithm
RSA is used for remote login session, multimedia, credit card payment systems and email
security. Key lengths are getting longer in RSA at an exponential phase without solving …
security. Key lengths are getting longer in RSA at an exponential phase without solving …