Bidzos bails and now this...Abstract: We present a theoretical
model for breaking various cryptographic schemes by taking advantage of
random hardware faults. We show how to attack certain implementations of
RSA and Rabin signatures. An implementation of RSA based on the Chinese
Remainder Theorem can be broken using a single erroneous signature. Other
implementations can be broken using a larger number of erroneous
signatures. We also analyze the vulnerability to hardware faults of two
identification protocols: Fiat-Shamir and...
(Update)
from
http://citeseer.nj.nec.com/boneh97importance.html