搜索结果: 1-6 共查到“军事学 CRT-RSA”相关记录6条 . 查询时间(0.046 秒)
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
RSA CRT fault injection
font style='font-size:12px;'>
2016/1/8
In this paper we study the existing CRT-RSA countermeasures against fault-injection attacks.
In an attempt to classify them we get to achieve deep understanding of how they work.
We show that the ma...
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
RSA CRT
font style='font-size:12px;'>
2014/3/10
In this article, we describe a methodology that aims at either breaking or proving the security of CRT-RSA implementations against fault injection attacks. In the specific case-study of the BellCoRe a...
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
fault injection BellCoRe attack
font style='font-size:12px;'>
2014/3/5
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged ...
Cryptanalysis of Dual CRT-RSA
RSA CRT-RSA Dual RSA Dual CRT-RSA Cryptanalysis Lattices
font style='font-size:12px;'>
2010/11/26
Several schemes under the framework of Dual RSA have been proposed by Sun et al (IEEE-IT, August 2007). We here concentrate on the Dual CRT-RSA scheme and present certain range of parameters for which...
Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
CRT-RSA Cryptanalysis Factorization
font style='font-size:12px;'>
2009/6/11
Let N = pq be the product of two large primes. Consider CRT-RSA with the public
encryption exponent e and private decryption exponents dp, dq. It is well known that given any one
of dp or dq (or bot...
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Second-Order Fault Analysis Resistance CRT-RSA cryptographic systems
font style='font-size:12px;'>
2009/6/11
Since their publication in 1996, Fault Attacks have been
widely studied from both theoretical and practical points of view and
most of cryptographic systems have been shown vulnerable to this kind
...