-
2
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Springer Berlin
-
D. Boneh, R.A. DeMillo, and R.J. Lipton On the importance of checking cryptographic protocols for faults Lecture Notes in Computer Science vol. 1233 1997 Springer Berlin 37 51
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
3
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith Small solutions to polynomial equations, and low exponent RSA vulnerabilities Journal of Cryptology 10 1997 233 260
-
(1997)
Journal of Cryptology
, vol.10
, pp. 233-260
-
-
Coppersmith, D.1
-
5
-
-
84954462346
-
A practical implementation of the timing attack
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestre, J.-J. Quisquater, J.-L. Willems, A practical implementation of the timing attack, in: CARDIS, 1998, pp. 167-182
-
(1998)
CARDIS
, pp. 167-182
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestre, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
6
-
-
84888203263
-
-
P. Gutmann, Cryptlib, Available from < http://www.cs.auckland.ac.nz/ pgut001/cryptlib/>
-
Cryptlib
-
-
Gutmann, P.1
-
8
-
-
0242521606
-
Using the RDTSC instruction for performance monitoring
-
Intel
-
Intel, Using the RDTSC instruction for performance monitoring, Technical report, Intel, 1997
-
(1997)
Technical Report
-
-
-
9
-
-
2442540896
-
IA-32 intel architecture optimization reference manual
-
Intel
-
Intel, IA-32 intel architecture optimization reference manual, Technical report 248966-008, Intel, 2003
-
(2003)
Technical Report 248966-008
-
-
-
10
-
-
84939573910
-
Differential power analysis: Leaking secrets
-
P. Kocher, J. Jaffe, B. Jun, Differential power analysis: Leaking secrets, in: Crypto 99, 1999, pp. 388-397
-
(1999)
Crypto 99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
11
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
P. Kocher Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems Advances in Cryptology 1996 104 113
-
(1996)
Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.1
-
13
-
-
18844418085
-
-
mod_SSL Project. mod_ssl, Available from < http://www.modssl.org>
-
-
-
-
14
-
-
84966243285
-
Modular multiplication without trial division
-
P. Montgomery Modular multiplication without trial division Mathematics of Computation 44 170 1985 519 521
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.1
-
15
-
-
18844403215
-
-
GNU Project. libgcrypt, Available from < http://www.gnu.org/directory/ security/libgcrypt.html>
-
Libgcrypt
-
-
-
16
-
-
18844443563
-
-
OpenSSL Project, Openssl, Available from < http://www.openssl.org>
-
-
-
-
17
-
-
18844386669
-
EMpowering side-channel attacks
-
IBM T.J. Watson Research Center
-
J.R. Rao, P. Rohatgi, EMpowering side-channel attacks, Technical report 2001/037, IBM T.J. Watson Research Center, 2001
-
(2001)
Technical Report
, vol.2001
, Issue.37
-
-
Rao, J.R.1
Rohatgi, P.2
-
18
-
-
18844423658
-
-
RSA Press Release, Available from < http://www.otn.net/onthenet/rsaqa. htm>, 1995
-
(1995)
-
-
-
19
-
-
68549092451
-
A timing attack against RSA with the chinese remainder theorem
-
W. Schindler, A timing attack against RSA with the chinese remainder theorem, in: CHES 2000, 2000, pp. 109-124
-
(2000)
CHES 2000
, pp. 109-124
-
-
Schindler, W.1
-
20
-
-
84958960266
-
A combined timing and power attack
-
Springer Berlin
-
W. Schindler A combined timing and power attack Lecture Notes in Computer Science vol. 2274 2002 Springer Berlin 263 279
-
(2002)
Lecture Notes in Computer Science
, vol.2274
, pp. 263-279
-
-
Schindler, W.1
-
21
-
-
84983436061
-
Optimized timing attacks against public key cryptosystems
-
W. Schindler Optimized timing attacks against public key cryptosystems Statistics and Decisions 20 2002 191 210
-
(2002)
Statistics and Decisions
, vol.20
, pp. 191-210
-
-
Schindler, W.1
-
22
-
-
84946828535
-
Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies
-
Springer Berlin
-
W. Schindler, F. Koeune, and J. Quisquater Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies Lecture Notes in Computer Science vol. 2260 2001 Springer Berlin 245 267
-
(2001)
Lecture Notes in Computer Science
, vol.2260
, pp. 245-267
-
-
Schindler, W.1
Koeune, F.2
Quisquater, J.3
-
23
-
-
18844409918
-
Unleashing the full power of timing attack
-
UCL Microelectronics Laboratory
-
W. Schindler, F. Koeune, J.-J. Quisquater, Unleashing the full power of timing attack, Technical report CG-2001/3, UCL Microelectronics Laboratory, 2001
-
(2001)
Technical Report
, vol.CG-2001-3
-
-
Schindler, W.1
Koeune, F.2
Quisquater, J.-J.3
-
24
-
-
18844405305
-
-
Stunnel project, Stunnel, Available from < http://www.stunnel.org>
-
-
-
|