Differential Fault Analysis of Secret Key Cryptosystems
@inproceedings{Biham1997DifferentialFA, title={Differential Fault Analysis of Secret Key Cryptosystems}, author={E. Biham and A. Shamir}, booktitle={CRYPTO}, year={1997} }
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES).
1,517 Citations
Evaluating Differential Fault Analysis of Unknown Cryptosystems
- Computer Science
- Public Key Cryptography
- 1999
- 13
Differential Fault Attacks on Elliptic Curve Cryptosystems
- Mathematics, Computer Science
- CRYPTO
- 2000
- 299
- PDF
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
- Computer Science
- ASIACRYPT
- 2016
- 38
- PDF
Improved Constructions of PRFs Secure Against Related-Key Attacks
- Mathematics, Computer Science
- ACNS
- 2014
- 24
- PDF
Chinese Remaindering Based Cryptosystems in the Presence of Faults
- Computer Science
- Journal of Cryptology
- 1999
- 156
- PDF
References
SHOWING 1-10 OF 50 REFERENCES
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Computer Science
- CRYPTO
- 1996
- 270
- PDF
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Computer Science
- CRYPTO
- 1996
- 3,994
- PDF
Differential Cryptanalysis of the Data Encryption Standard
- Mathematics, Computer Science
- Springer New York
- 1993
- 919
- PDF
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
- Computer Science
- FSE
- 1993
- 876
- PDF
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
- Computer Science
- AUSCRYPT
- 1990
- 128