Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
On the importance of eliminating errors in cryptographic computations - MaRDI portal

On the importance of eliminating errors in cryptographic computations

From MaRDI portal
Publication:5934142

DOI10.1007/s001450010016zbMath1018.94014OpenAlexW2066425771WikidataQ127452576 ScholiaQ127452576MaRDI QIDQ5934142

Dan Boneh, Richard J. Lipton, Richard A. DeMillo

Publication date: 26 August 2003

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s001450010016




Related Items (32)

Witness Maps and ApplicationsA note on perfect correctness by derandomizationEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsThe Chaining Lemma and Its ApplicationThe random oracle model: a twenty-year retrospectiveFault attacks on hyperelliptic curve discrete logarithm problem over binary fieldAnalysis of the fault attack ECDLP over prime fieldFault Attacks on Public Key Elements: Application to DLP-Based SchemesFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesMontgomery Residue Representation Fault-Tolerant Computation in GF(2 k )A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackPhysical attacks and beyondLoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesContinuously non-malleable codes in the split-state modelFault-Tolerant Finite Field Computation in the Public Key CryptosystemsGlitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGAFault-based attack on Montgomery's ladder algorithmA Fault Attack on the LED Block CipherTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceBounded tamper resilience: how to go beyond the algebraic barrierElliptic curve cryptosystems in the presence of permanent and transient faultsProtecting ECC against fault attacks: the ring extension method revisitedFault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also VulnerableLocally decodable and updatable non-malleable codes and their applicationsAn Improved Fault Based Attack of the Advanced Encryption StandardFault based attack of the Rijndael cryptosystemImpossibility on tamper-resilient cryptography with uniqueness propertiesPartial Key Exposure: Generalized Framework to Attack RSAThwarting side-channel analysis against RSA cryptosystems with additive blindingPerturbating RSA Public Keys: An Improved AttackA Note on Perfect Correctness by DerandomizationRevisiting prime power RSA




This page was built for publication: On the importance of eliminating errors in cryptographic computations