Back to Results
First PageMeta Content
RSA / Fault injection / Probabilistic encryption / Advanced Encryption Standard / Paillier cryptosystem / Side channel attack / Computer security / Initialization vector / Cryptography / Public-key cryptography / Electronic commerce


Author manuscript, published in "Fault Diagnosis and Tolerance in Cryptography, Santa Barbara : United States (2010)" DOI : [removed]FDTC[removed]
Add to Reading List

Document Date: 2010-11-11 06:25:51


Open Document

File Size: 404,31 KB

Share Result on Facebook

City

Santa Barbara / Paris / /

Company

Nidhal SELMANE1 1 Institut TELECOM / the AES / Secure-IC S.A.S. / /

Country

France / United States / /

/

Event

Product Issues / /

IndustryTerm

composition law / secure embedded systems / secure device / vulnerable device / data processing part / analogue solutions / probabilistic symmetric encryption algorithm / decryption algorithm / wireless sensor network / chip manufacturer / nominal device / protected devices / handy homomorphous encryption algorithm / cryptographic protocols / larger device / analogue solution / security chain / cryptographic algorithms / cryptographic devices / high energy laser light / resilient algorithms / encryption algorithm / /

OperatingSystem

DoS / /

Organization

DPL FIR / U.S. Securities and Exchange Commission / IN RED / FSA / /

Person

Ross Anderson / Paul C. Kocher / Markus Kuhn / /

/

Position

Author / designer / representative / /

Product

S.A.S / Fault Injection / result / card / information / results / encryption / computation / /

Technology

WDDL chip / RAM / weakest element Algorithm / valid encryption / corresponding decryption algorithm / encryption algorithm / DPL protocol / Probabilistic Encryption Algorithm / block cipher / private key / handy homomorphous encryption algorithm / secret key / typical encryption / operating system / probabilistic symmetric encryption algorithm / VHDL / symmetric block encryption / encryption / CRT2 algorithm / Cryptography / laser / same encryption / Deterministic Decryption Algorithm / resilient algorithms / Probabilistic Decryption Algorithm / decryption algorithm / two encryptions / recombination / cryptographic algorithms / Flash / CAD / UART / /

SocialTag