Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults

77Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant devices. The attack makes use of transient faults and seems applicable to many types of PKCs. In particular, we show how to attack the RSA, the E1Gamal signature scheme, the Schnorr signature scheme, and the DSA. We also present some possible methods to counter the attack.

Cite

CITATION STYLE

APA

Bao, F., Deng, R. H., Han, Y., Jeng, A., Narasimhalu, A. D., & Ngair, T. (1998). Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1361, pp. 115–124). Springer Verlag. https://doi.org/10.1007/BFb0028164

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free