Facebook Instagram Twitter RSS Feed PodBean Back to top on side

How to use un-trusty cryptographic devices

In: Tatra Mountains Mathematical Publications, vol. 29, no. 3
Joanna Kucner - Mirosław Kutyłowski
Detaily:
Rok, strany: 2004, 57 - 67
O článku:
Devices implementing cryptographic operations such as electronic signatures can leak information on secret data using kleptography, even if they are claimed to be secure. Testing these devices is extremely hard, since on one hand a major design goal is to disable external access to the device, and on the other hand the output of a contaminated device might be indistinguishable from the legitimate one if a secret data is unknown. We discuss a couple of simple and cheap techniques that may be used as a defense against such threats.
Ako citovať:
ISO 690:
Kucner, J., Kutyłowski, M. 2004. How to use un-trusty cryptographic devices. In Tatra Mountains Mathematical Publications, vol. 29, no.3, pp. 57-67. 1210-3195.

APA:
Kucner, J., Kutyłowski, M. (2004). How to use un-trusty cryptographic devices. Tatra Mountains Mathematical Publications, 29(3), 57-67. 1210-3195.