Scan attacks on side-channel and fault attack resistant public-key implementations.
Jean DaRoltAmitabh DasSantosh GhoshGiorgio Di NataleMarie-Lise FlottesBruno RouzeyreIngrid VerbauwhedePublished in: J. Cryptogr. Eng. (2012)
Keyphrases
- public key
- countermeasures
- secret key
- power analysis
- chosen ciphertext
- block cipher
- fault injection
- encryption scheme
- security analysis
- information security
- security model
- digital signature
- authentication protocol
- ciphertext
- image authentication
- signature scheme
- authentication scheme
- forward secure
- diffie hellman
- elliptic curve cryptography
- fault model
- public key cryptography
- secure communication
- public key cryptosystem
- private key
- standard model
- smart card
- cryptographic protocols
- security level
- proxy re encryption
- user authentication
- provably secure
- security mechanisms
- blind signature scheme
- blind signature