Perturbating RSA Public Keys: An Improved Attack, Cryptographic Hardware and Embedded Systems Lecture Notes in Computer Science, 2008. ,
DOI : 10.1007/978-3-540-85053-3_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.5919
Why One Should Also Secure RSA Public Key Elements, Cryptographic Hardware and Embedded Systems, pp.324-338, 2006. ,
DOI : 10.1007/11894063_26
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults, Security Protocols, pp.115-124, 1998. ,
On the Importance of Checking Cryptographic Protocols for Faults, Lecture Notes in Computer Science, vol.1233, issue.97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, vol.14, issue.2, pp.101-119, 2001. ,
DOI : 10.1007/s001450010016
The Sorcerer's Apprentice Guide to Fault Attacks, Cryptology ePrint Archive Report, vol.100, 2004. ,
Wagner???s Attack on a Secure CRT-RSA Algorithm Reconsidered, Fault Diagnosis and Tolerance in Cryptography, pp.13-23, 2006. ,
DOI : 10.1007/11889700_2
A New CRT-RSA Algorithm Secure Against Bellcore Attack, ACM Conference on Computer and Communication Security (CCS 2003), pp.311-320, 2003. ,
Differential fault analysis of secret key cryptosystems, Crypto'97, 1997. ,
DOI : 10.1007/BFb0052259
De la sécurité physique des crypto-systèmes embarqués, 2007. ,
A Course in Computational Algebraic Number Theory, 1993. ,
Autour de la fonction qui compte le nombre de nombres premiers, 1998. ,
DFA on AES, Fourth Conference on the Advanced Encryption Standard (AES4), pp.27-41, 2005. ,
Fault-Resistant RSA Implementation, Fault Diagnosis and Tolerance in Cryptography, pp.142-151, 2005. ,
Seifert's RSA Fault Attack : Simplified Analysis and Generalizations, Cryptology ePrint Archive Report, vol.458, 2005. ,
Probabilistic algorithm for testing primality, Journal of Number Thoery, vol.12, issue.1, pp.128-138, 1980. ,
On Authenticated Computing and RSA-Based Authentication, ACM Conference on Computer and Communications Security (CCS 2005), pp.122-127, 2005. ,
A Computational Introduction to Number Theory and Algebra, 2005. ,
Cryptanalysis of a provably secure CRT-RSA algorithm, Proceedings of the 11th ACM Conference on Computer Security, pp.92-97, 2004. ,