next up previous
Up: Cautionary note for protocol Previous: Conclusions

References

1
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. In 1994 IEEE Symposium on Security and Privacy, pages 122-136. IEEE Press, 1994.

2
R. Anderson and R. Needham. Robustness principles for public key protocols. In D. Coppersmith, editor, Advances in Cryptology - Crypto'95, volume 963 of Lecture Notes in Computer Science, pages 236-247. Springer-Verlag, 1995.

3
D. Boneh, R. A. DeMillo, and R. J. Lipton. On the importance of checking cryptographic protocols for faults. In W. Fumy, editor, Advances in Cryptology - Eurocrypt'97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer-Verlag, 1997.

4
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Trans. on Computer Systems, 8(1):18-36, February 1990.

5
G. Davida. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Technical Report TR-CS-82-2, Dept. of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee, USA, October 1982.

6
A. Gillet, M. Joye, and J.-J. Quisquater. Cycling attacks against faulty hardware. Technical Report CG-1997/6, UCL Crypto Group, Louvain-la-Neuve, June 1997.

7
M. Joye, A. K. Lenstra, and J.-J. Quisquater. Chinese remaindering in the presence of faults. Submitted to Journal of Cryptology.

8
R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.

9
D. E. Knuth. The art of computer programming: Volume 2/Seminumerical algorithms. Addison-Wesley, 2nd edition, 1981.

10
A. K. Lenstra. Memo on RSA signature generation in the presence of faults, September 1996.

11
J. H. Moore. Protocol failures in cryptosystems. In G. Simmons, editor, Contemporary Cryptology, pages 541-558. IEEE Press, 1992.

12
J.-J. Quisquater and C. Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters, 18(21):905-907, 1982.

13
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

14
A. Shamir. How to check modular exponentiation. Presented at the rump session of Eurocrypt'97.