Bidzos bails and now this...Abstract: We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. An implementation of RSA based on the Chinese Remainder Theorem can be broken using a single erroneous signature. Other implementations can be broken using a larger number of erroneous signatures. We also analyze the vulnerability to hardware faults of two identification protocols: Fiat-Shamir and... (Update) from [1]http://citeseer.nj.nec.com/boneh97importance.html References 1. http://citeseer.nj.nec.com/boneh97importance.html