000 06135nam a22006855i 4500
001 978-3-540-46251-4
003 DE-He213
005 20240730182959.0
007 cr nn 008mamaa
008 100325s2006 gw | s |||| 0|eng d
020 _a9783540462514
_9978-3-540-46251-4
024 7 _a10.1007/11889700
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aFault Diagnosis and Tolerance in Cryptography
_h[electronic resource] :
_bThird International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings /
_cedited by Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXIV, 258 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4236
505 0 _aAttacks on Public Key Systems -- Is It Wise to Publish Your Public RSA Keys? -- Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered -- Attacking Right-to-Left Modular Exponentiation with Timely Random Faults -- Sign Change Fault Attacks on Elliptic Curve Cryptosystems -- Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection -- Protection of Public Key Systems -- Blinded Fault Resistant Exponentiation -- Incorporating Error Detection in an RSA Architecture -- Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation -- Attacks on and Protection of Symmetric Key Systems -- Case Study of a Fault Attack on Asynchronous DES Crypto-Processors -- A Fault Attack Against the FOX Cipher Family -- Fault Based Collision Attacks on AES -- An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers -- Models for Fault Attacks on Cryptographic Devices -- An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices -- Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults -- A Comparative Cost/Security Analysis of Fault Attack Countermeasures -- Fault-Resistant Arithmetic for Cryptography -- Non-linear Residue Codes for Robust Public-Key Arithmetic -- Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection -- Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography -- Fault Attacks and Other Security Threats -- DPA on Faulty Cryptographic Hardware and Countermeasures -- Fault Analysis of DPA-Resistant Algorithms -- Java Type Confusion and Fault Attacks.
520 _aIn recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others. Cryptosystems are inherently computationally complex and in order to satisfy the high throughput requirements of many applications, they are often implemented by means of either VLSI devices (cryptographic accelerators) or highly optimized software routines (cryptographic libraries) and are used via suitable (network) protocols. The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access and low cost of cryptographic devices resulted in increased concerns regarding the reliability and security of crypto-devices. The effectiveness of side channel attacks on cryptographic devices, like timing and power-based attacks, has been known for some time. Several recent investigations have demonstrated the need to develop methodologies and techniques for designing robust cryptographic systems (both hardware and software) to protect them against both accidental faults and maliciously injected faults with the purpose of extracting the secret key. This trend has been particularly motivated by the fact that the equipment needed to carry out a successful side channel attack based on fault injection is easily accessible at a relatively low cost (for example, laser beam technology), and that the skills needed to use it are quite common. The identification of side channel attacks based on fault injections and the development of appropriate counter-measures have therefore become an active field of scientific and industrial research.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aOperating systems (Computers).
_95329
650 0 _aElectronic data processing
_xManagement.
_9129942
650 0 _aComputers and civilization.
_921733
650 0 _aInformation storage and retrieval systems.
_922213
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9129943
650 2 4 _aOperating Systems.
_937074
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
650 2 4 _aInformation Storage and Retrieval.
_923927
700 1 _aBreveglieri, Luca.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9129944
700 1 _aKoren, Israel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9129945
700 1 _aNaccache, David.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9129946
700 1 _aSeifert, Jean-Pierre.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9129947
710 2 _aSpringerLink (Online service)
_9129948
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540462507
776 0 8 _iPrinted edition:
_z9783540831211
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4236
_9129949
856 4 0 _uhttps://doi.org/10.1007/11889700
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91600
_d91600