Learn More
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often employed in modern cryptographic applications. Previously, fault attacks on elliptic curves aimed to force a device to output points which are on a cryptographically weak curve. Such(More)
In this paper we describe a new algorithm to prevent fault attacks on RSA signature algorithms using the Chinese Remainder Theorem (CRT-RSA). This variant of the RSA signature algorithm is widely used on smartcards. Smartcards on the other hand are particularly susceptible to fault attacks like the one described in [7]. Recent results have shown that fault(More)
www.MaterialsViews.com C O M Conformal Transparent Conducting Oxides on Black Silicon M U N IC By Martin Otto ,* Matthias Kroll , Thomas Käsebier , Seung-Mo Lee , Matti Putkonen , Roland Salzer , Paul T. Miclea , and Ralf B. Wehrspohn A IO N Black silicon (b-Si) has the potential for groundbreaking applications in microelectromechanical systems (MEMS),(More)
Enkephalin-deficient knockout mice, a genetic model of enhanced anxiety responses, and wild-type controls were housed in two separate facilities on the same campus using different caging systems. Stress reactivity was evaluated in these animals using a zero-maze test followed by c-Fos expression analysis in limbic brain regions. Animals with genetically or(More)
We consider \generic" (isomorphism-invariant) queries on rela-tional databases embedded in an innnite background structure. Assume a generic query is expressible by a rst-order formula over the embedded domain that may involve both the relations of the database and the relations and functions of the background structure. Then this query is already(More)
Authentication of participants is fundamental for secure communication systems. Many traditional systems rely on central components (like certification authorities). These have to be powerful and well-protected, making them expensive, and require trust in a central authority. Conventional decentralized solutions based on local trust between participants(More)
  • 1