메뉴 건너뛰기




Volumn 4, Issue , 1998, Pages 319-327

Evaluating certification authority security

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; WIDE AREA NETWORKS;

EID: 0031630935     PISSN: 1095323X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AERO.1998.682202     Document Type: Conference Paper
Times cited : (12)

References (9)
  • 5
    • 0018545449 scopus 로고
    • How to share a Secret
    • November
    • Adi Shamir., How to Share a Secret, " CACM 22 (11), November, 1979.
    • (1979) CACM , vol.22 , Issue.11
    • Shamir, A.1
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on diffle-hellman, RSA, DSA, other systems
    • N. Koblitz (ed.) Springer-Verlag
    • Paul Kocher "Timing Attacks on Diffle-Hellman, RSA, DSA, Other Systems, " In N. Koblitz (ed.), Advances in Cryptology-Crypto '96, Lecture Notes in Computer Science, vol. 1109, pages 104-113, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology-Crypto '96, Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 7
    • 0002380073 scopus 로고    scopus 로고
    • Tamper resistance-a cautionary note
    • November
    • Ross Anderson and Brian Kuhn, "Tamper Resistance-A Cautionary Note, " Usenix Electronic Commerce 96, November, 1996.
    • (1996) Usenix Electronic Commerce , vol.96
    • Anderson, R.1    Kuhn, B.2
  • 8
    • 85054324244 scopus 로고    scopus 로고
    • The next stage of differential fault analysis: How to break completely unknown cryptosystems
    • October
    • Eli Biham and Adi Shamir, "The Next Stage of Differential Fault Analysis: How to break completely unknown cryptosystems, " Risks Digest, 18 (58), October, 1996.
    • (1996) Risks Digest , vol.18 , pp. 58
    • Biham, E.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.