Probabilistic signature scheme, 2001. ,
A new CRT-RSA algorithm secure against Bellcore attacks, ACM Conference on Computer and Communications Security, pp.311-320, 2003. ,
On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
Modulus fault attacks against RSA-CRT signatures, CHES, pp.192-206, 2011. ,
DOI : 10.1007/978-3-642-23951-9_13
URL : https://hal.archives-ouvertes.fr/hal-01109981
Faster algorithms for approximate common divisors, LNCS, vol.7237, pp.502-519, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00864374
A Karatsuba-Based Montgomery Multiplier, 2010 International Conference on Field Programmable Logic and Applications, pp.434-437, 2010. ,
DOI : 10.1109/FPL.2010.89
Practical fault countermeasures for Chinese remaindering based cryptosystems, pp.124-131, 2005. ,
Approximate common divisors via lattices. Cryptology ePrint Archive, Report, vol.437, 2011. ,
DOI : 10.2140/obs.2013.1.271
URL : http://arxiv.org/abs/1108.2714
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.89-96, 2010. ,
DOI : 10.1109/FDTC.2010.9
Fault Attacks on RSA Signatures with Partially Unknown Messages, CHES, pp.444-456, 2009. ,
DOI : 10.1007/978-3-642-04138-9_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6407
PSS Is Secure against Random Fault Attacks, LNCS, vol.5912, pp.653-666, 2009. ,
DOI : 10.1007/978-3-642-10366-7_38
URL : http://orbilu.uni.lu/handle/10993/12503
Fault Attacks Against emv Signatures, LNCS, vol.5985, pp.208-220, 2010. ,
DOI : 10.1007/978-3-642-11925-5_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.4408
Attacking RSA?CRT signatures with faults on Montgomery multiplication, Cryptology ePrint Archive, vol.172, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01094316
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis, IEEE Transactions on Computers, vol.55, issue.9, pp.1116-1120, 2006. ,
DOI : 10.1109/TC.2006.135
Approximate Integer Common Divisors, LNCS, vol.2146, pp.51-66, 2001. ,
DOI : 10.1007/3-540-44670-2_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.4244
An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm, LNCS, vol.4939, pp.214-228, 2008. ,
DOI : 10.1007/978-3-540-78440-1_13
Analyzing and comparing Montgomery multiplication algorithms, IEEE Micro, vol.16, issue.3, pp.26-33, 1996. ,
DOI : 10.1109/40.502403
Modified Montgomery modular multiplication and RSA exponentiation techniques, IEE Proceedings -Computers and Digital Techniques, pp.402-408, 2004. ,
DOI : 10.1049/ip-cdt:20040791
Efficient pipelining for modular multiplication architectures in prime fields, Proceedings of the 17th great lakes symposium on Great lakes symposium on VLSI , GLSVLSI '07, pp.534-539, 2007. ,
DOI : 10.1145/1228784.1228911
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.323.6695
Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985. ,
DOI : 10.1090/S0025-5718-1985-0777282-X
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication, CHES, volume 2162 of LNCS, pp.364-376, 2001. ,
DOI : 10.1007/3-540-44709-1_30
Simplifying quotient determination in high-radix modular multiplication, Proceedings of the 12th Symposium on Computer Arithmetic, pp.193-193, 1995. ,
DOI : 10.1109/ARITH.1995.465359
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation, LNCS, vol.52, issue.4, pp.459-480, 2009. ,
DOI : 10.1109/TC.2003.1190587
Improved method and apparatus for protecting public key schemes from timing and fault attacks, pp.52319-52320, 1998. ,
Optical Fault Masking Attacks, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.23-29, 2010. ,
DOI : 10.1109/FDTC.2010.18
Optical Fault Induction Attacks, CHES, volume 2523 of LNCS, pp.2-12, 2002. ,
DOI : 10.1007/3-540-36400-5_2
How to Maximize the Potential of FPGA Resources for Modular Exponentiation, CHES, pp.272-288, 2007. ,
DOI : 10.1007/978-3-540-74735-2_19
A scalable architecture for Montgomery multiplication, Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, CHES '99, pp.94-108, 1999. ,
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks, CHES, pp.130-145, 2008. ,
DOI : 10.1007/978-3-540-85053-3_9
Hardware Fault Attack on RSA with CRT Revisited, LNCS, vol.2587, pp.374-388, 2002. ,
DOI : 10.1007/3-540-36552-4_26