{q}, r ; := { q^-1 mod p } ,
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures ,
DOI : 10.1007/3-540-36400-5_20
A Survey of Differential Fault Analysis Against Classical RSA Implementations, Fault Analysis in Cryptography, Information Security and Cryptography, pp.111-124, 2012. ,
DOI : 10.1007/978-3-642-29656-7_7
Bug attacks, CRYPTO, pp.221-240, 2008. ,
DOI : 10.1007/978-3-540-85174-5_13
On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of Eurocrypt'97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
ProVerif: Cryptographic protocol verifier in the formal model ,
A new CRT-RSA algorithm secure against bellcore attacks, ACM Conference on Computer and Communications Security, pp.311-320, 2003. ,
Differential fault analysis of secret key cryptosystems, CRYPTO, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
Formal verification of an implementation of CRT-RSA Vigilant's algorithm, Journal of Cryptographic Engineering, vol.3, issue.3 ,
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm, pp.89-96, 2010. ,
Wavelet transform based pre-processing for side channel analysis, 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, pp.32-38, 2012. ,
DOI : 10.1109/MICROW.2012.15
Number Systems and Arithmetic, Advances in Computers, vol.6, pp.131-194, 1965. ,
Provably secure concurrent error detection against differential fault analysis, Cryptology ePrint Archive, vol.552552, 2012. ,
DOI : 10.1007/s13389-014-0092-8
OCaml, a variant of the Caml language ,
Chinese Remaindering Based Cryptosystems in the Presence of Faults, Journal of Cryptology, vol.12, issue.4, pp.241-245, 1999. ,
DOI : 10.1007/s001459900055
Protecting RSA against Fault Attacks: The Embedding Method, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.41-45, 2009. ,
DOI : 10.1109/FDTC.2009.32
GCD-Free Algorithms for Computing Modular Inverses, CHES, pp.243-253, 2003. ,
DOI : 10.1007/978-3-540-45238-6_20
Differential Power Analysis, Proceedings of CRYPTO'99, pp.388-397, 1999. ,
An efficient CRT-RSA algorithm secure against power and fault attacks, Journal of Systems and Software, vol.84, issue.10, pp.1660-1669, 2011. ,
DOI : 10.1016/j.jss.2011.04.026
High-Speed RSA Implementation, 1994. ,
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack ? A Pledge for Formal Methods in the Field of Implementation Security, 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, pp.978-979, 2014. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Novel Applications of Wavelet Transforms based Side-Channel Analysis, Non-Invasive Attack Testing Workshop, 2011. ,
Method and apparatus for protecting public key schemes from timing and fault attacks Patent Number 5,991,415; also presented at the rump session of EUROCRYPT, p.97, 1999. ,
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks, CHES, pp.130-145, 2008. ,
DOI : 10.1007/978-3-540-85053-3_9