Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FDTC
FDTC 2009
Generate Citations
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
Sept. 6 2009 to Sept. 6 2009
Lausanne, Switzerland
ISBN: 978-0-7695-3824-2
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vi
Program Committee
Freely available from IEEE.
pp. viii-viii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Publisher's information]
Freely available from IEEE.
pp. 128
Papers
Preface
Freely available from IEEE.
pp. vii
Papers
Blinded Fault Resistant Exponentiation Revisited
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-9
by
Arnaud Boscher
,
Helena Handschuh
,
Elena Trichina
Papers
Optical Fault Attacks on AES: A Threat in Violet
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-22
by
Jörn-Marc Schmidt
,
Michael Hutter
,
Thomas Plos
Papers
Low Voltage Fault Attacks on the RSA Cryptosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-31
by
Alessandro Barenghi
,
Guido Bertoni
,
Emanuele Parrinello
,
Gerardo Pelosi
Papers
Fault Attack on Schnorr Based Identification and Signature Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-38
by
Pierre-Alain Fouque
,
Delphine Masgana
,
Frédéric Valette
Papers
Protecting RSA against Fault Attacks: The Embedding Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-45
by
Marc Joye
Papers
Securing the Elliptic Curve Montgomery Ladder against Fault Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-50
by
Nevine Ebeid
,
Rob Lambert
Papers
Securing AES Implementation against Fault Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-62
by
Laurie Genelle
,
Christophe Giraud
,
Emmanuel Prouff
Papers
KeeLoq and Side-Channel Analysis-Evolution of an Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-69
by
Christof Paar
,
Thomas Eisenbarth
,
Markus Kasper
,
Timo Kasper
,
Amir Moradi
Papers
WDDL is Protected against Setup Time Violation Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-83
by
Nidhal Selmane
,
Shivam Bhasin
,
Sylvain Guilley
,
Tarik Graba
,
Jean-Luc Danger
Papers
Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-92
by
Toshinori Fukunaga
,
Junko Takahashi
Papers
A Fault Attack on ECDSA
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-99
by
Jörn-Marc Schmidt
,
Marcel Medwed
Papers
Fault Analysis of the Stream Cipher Snow 3G
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-110
by
Blandine Debraize
,
Irene Marquez Corbella
Papers
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-119
by
Sergei Skorobogatov
Papers
Differential Fault Analysis on SHACAL-1
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-126
by
Ruilin Li
,
Chao Li
,
Chunye Gong
Papers
Author Index
Freely available from IEEE.
pp. 127
Showing 22 out of 22