The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Maklumat rahsia yang disimpan dalam peranti bebas gangguan didedahkan semasa proses penyahsulitan atau penjanaan tandatangan disebabkan oleh serangan berasaskan kesalahan. Dalam kertas kerja ini, berdasarkan pendekatan pengekodan, kami mencadangkan sistem tahan kerosakan baharu yang membolehkan sebarang kesalahan yang wujud dalam pengiraan pendaraban dan eksponen modular dikesan dengan kebarangkalian yang sangat tinggi. Kaedah yang dicadangkan boleh digunakan untuk melaksanakan semua skim kripto yang operasi asasnya ialah pendaraban modular untuk menentang kedua-dua memori dan serangan berasaskan kesalahan pengiraan dengan overhed pengiraan yang sangat rendah.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Chi-Sung LAIH, Fu-Kuan TU, Yung-Cheng LEE, "On the Implementation of Public Key Cryptosystems against Fault-Based Attacks" in IEICE TRANSACTIONS on Fundamentals,
vol. E82-A, no. 6, pp. 1082-1089, June 1999, doi: .
Abstract: Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resistant system which enables any fault existing in modular multiplication and exponentiation computations to be detected with a very high probability. The proposed method can be used to implement all crypto-schemes whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e82-a_6_1082/_p
Salinan
@ARTICLE{e82-a_6_1082,
author={Chi-Sung LAIH, Fu-Kuan TU, Yung-Cheng LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={On the Implementation of Public Key Cryptosystems against Fault-Based Attacks},
year={1999},
volume={E82-A},
number={6},
pages={1082-1089},
abstract={Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resistant system which enables any fault existing in modular multiplication and exponentiation computations to be detected with a very high probability. The proposed method can be used to implement all crypto-schemes whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.},
keywords={},
doi={},
ISSN={},
month={June},}
Salinan
TY - JOUR
TI - On the Implementation of Public Key Cryptosystems against Fault-Based Attacks
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1082
EP - 1089
AU - Chi-Sung LAIH
AU - Fu-Kuan TU
AU - Yung-Cheng LEE
PY - 1999
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E82-A
IS - 6
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - June 1999
AB - Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resistant system which enables any fault existing in modular multiplication and exponentiation computations to be detected with a very high probability. The proposed method can be used to implement all crypto-schemes whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
ER -