-
1
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystem
-
Feb.
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystem," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
2
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
July
-
T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, July 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
3
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
D. Boneh, R.A. DeMillo, and R.J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," Proc. Advances in Cryptology - EUROCRYPT '97, pp. 37-51, 1997.
-
(1997)
Proc. Advances in Cryptology - EUROCRYPT '97
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
5
-
-
0004794569
-
Chinese Remaindering Based CryptoSystems in the Presence of Faults
-
M. Joye, A.K. Lenstra, and T.-T. Quisquater, "Chinese Remaindering Based CryptoSystems in the Presence of Faults," J. Cryptology, vol. 12, no. 4, pp. 241-245, 1999.
-
(1999)
J. Cryptology
, vol.12
, Issue.4
, pp. 241-245
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, T.-T.3
-
6
-
-
84956981493
-
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
-
F. Bao, R.H. Deng, Y. Han, A. Jeng, A.D. Narasimbalu, and T. Ngair, "Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults," Proc. Security Protocols, pp. 115-124, 1998.
-
(1998)
Proc. Security Protocols
, pp. 115-124
-
-
Bao, F.1
Deng, R.H.2
Han, Y.3
Jeng, A.4
Narasimbalu, A.D.5
Ngair, T.6
-
7
-
-
33749904500
-
Breaking Real-World Implementations of Cryptosystems by Manipulating Their Random Number Generation
-
Tan./Feb.
-
Y. Zheng and T. Matsumoto, "Breaking Real-World Implementations of Cryptosystems by Manipulating Their Random Number Generation," Preproc. 1997 Symp. Cryptography and Information Security, Tan./Feb. 1997.
-
(1997)
Preproc. 1997 Symp. Cryptography and Information Security
-
-
Zheng, Y.1
Matsumoto, T.2
-
9
-
-
47949098691
-
How to Check Modular Exponentiation
-
Presented May
-
A. Shamir, "How to Check Modular Exponentiation," Presented at the rump session of EUROCRYPT '97, May 1997
-
(1997)
Rump Session of EUROCRYPT '97
-
-
Shamir, A.1
-
10
-
-
0002557564
-
Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective
-
D.P. Maher, "Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective," Proc. Financial Cryptography, pp. 109-121, 1997.
-
(1997)
Proc. Financial Cryptography
, pp. 109-121
-
-
Maher, D.P.1
-
11
-
-
18744414026
-
Comments on Some New Attacks on Cryptographic Devices
-
Redwood City, Calif., July
-
B.S. Kaliski Jr. and M.J.B. Robshaw, "Comments on Some New Attacks on Cryptographic Devices," RSA Laboratories Bulletin, no. 5, Redwood City, Calif., July 1997.
-
(1997)
RSA Laboratories Bulletin
, Issue.5
-
-
Kaliski Jr., B.S.1
Robshaw, M.J.B.2
-
13
-
-
84957018842
-
Low Cost Attacks on Tamper Resistant Devices
-
R. Anderson and M. Kuhn, "Low Cost Attacks on Tamper Resistant Devices," Proc. Security Protocols, pp. 125-136, 1998.
-
(1998)
Proc. Security Protocols
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
14
-
-
0004610703
-
Secure Deletion of Data from Magnetic and Solid-State Memory
-
P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," Proc. Sixth USENIX Security Symp., pp. 77-89, 1996.
-
(1996)
Proc. Sixth USENIX Security Symp.
, pp. 77-89
-
-
Gutmann, P.1
-
15
-
-
33749974292
-
Hardwaresicherheit von Mikrochips in Chipkarten
-
July
-
O. Kocar, "Hardwaresicherheit von Mikrochips in Chipkarten," Datenschutz und Datensicherheit, vol. 20, no. 7, pp. 421-424, July 1996.
-
(1996)
Datenschutz und Datensicherheit
, vol.20
, Issue.7
, pp. 421-424
-
-
Kocar, O.1
-
16
-
-
0038214614
-
Chinks in Digital Armor - Exploiting Faults to Break Smart-Card Cryptosystems
-
Feb.
-
I. Peterson, "Chinks in Digital Armor - Exploiting Faults to Break Smart-Card Cryptosystems," Science News, vol. 151, no. 5, pp. 78-79, Feb. 1997.
-
(1997)
Science News
, vol.151
, Issue.5
, pp. 78-79
-
-
Peterson, I.1
-
18
-
-
0020751036
-
A Computer Algorithm for the Product AB Modulo M
-
May
-
G.R. Blakley, "A Computer Algorithm for the Product AB Modulo M," IEEE Trans. Computers, vol. 32, no. 5, pp. 497-500, May 1983.
-
(1983)
IEEE Trans. Computers
, vol.32
, Issue.5
, pp. 497-500
-
-
Blakley, G.R.1
-
19
-
-
3042549976
-
Comments on 'A Computer Algorithm for the Product AB Modulo M
-
Mar.
-
K.R. Sloan Jr., "Comments on 'A Computer Algorithm for the Product AB Modulo M," IEEE Trans. Computers, vol. 34, no. 3, pp. 290-292, Mar. 1985.
-
(1985)
IEEE Trans. Computers
, vol.34
, Issue.3
, pp. 290-292
-
-
Sloan Jr., K.R.1
-
20
-
-
0003421346
-
RSA Hardware Implementation
-
RSA Laboratories, Redwood City, Calif., Apr.
-
C.K. Koç, "RSA Hardware Implementation," Technical Report TR 801, RSA Laboratories, Redwood City, Calif., Apr. 1996.
-
(1996)
Technical Report TR 801
-
-
Koç, C.K.1
-
22
-
-
84947735905
-
An Attack on RSA Given a Small Fraction of the Private Key Bits
-
D. Boneh, G. Durfee, and Y. Frankel, "An Attack on RSA Given a Small Fraction of the Private Key Bits," Proc. Advances in Cryptology - ASMCRYPT '98, pp. 25-34, 1998.
-
(1998)
Proc. Advances in Cryptology - ASMCRYPT '98
, pp. 25-34
-
-
Boneh, D.1
Durfee, G.2
Frankel, Y.3
-
23
-
-
0003508568
-
-
Nat'l Bureau of Standards, US Dept. of Commerce, Jan.
-
NBS FIPS PUB, "Data Encryption Standard," Nat'l Bureau of Standards, US Dept. of Commerce, Jan. 1977.
-
(1977)
Data Encryption Standard
-
-
|