publication . Other literature type . Part of book or chapter of book . 1997

On the importance of checking cryptographic protocols for faults

Richard A. DeMillo; Richard J Lipton; Dan Boneh;
Open Access
  • Published: 01 Jan 1997
  • Publisher: Springer Berlin Heidelberg
We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.
free text keywords: Cryptography, business.industry, business, Embedded system, Distributed computing, Certificate authority, Smart card, Cryptographic primitive, Authentication protocol, Computer science, Differential fault analysis, Modular arithmetic, Cryptographic protocol
Related Organizations
Download fromView all 2 versions
Part of book or chapter of book
Provider: UnpayWall
Part of book or chapter of book . 2007
Provider: Crossref
Other literature type . 1997
Provider: Datacite
Any information missing or wrong?Report an Issue