-
1
-
-
0034828870
-
Cryptographic Security for Mobile Code
-
May
-
J. Algesheimer, C. Cachin, J. Camenisch, G. Karjoth, Cryptographic Security for Mobile Code, pp. 2-11 in Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
2
-
-
84957018842
-
Low Cost Attacks on Tamper-Resistant Devices
-
5th International Workshop on Security Protocols Springer
-
R.J. Anderson, M.G. Kuhn, Low Cost Attacks on Tamper-Resistant Devices, pp. 125-136, 5th International Workshop on Security Protocols (LNCS 1361), Springer 1997.
-
(1997)
LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
3
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Advances in Cryptology - Crypto 2001 Springer-Verlag
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang, On the (Im)possibility of Obfuscating Programs, pp. 1-18, Advances in Cryptology - Crypto 2001 (LNCS 2139), Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Advances in Cryptology - Crypto '97 Springer-Verlag, 1997. Revised: Technion - C.S. Dept. - Technical Report CS0910-revised
-
E. Biham, A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, pp. 513-525, Advances in Cryptology - Crypto '97 (LNCS 1294), Springer-Verlag, 1997. Revised: Technion - C.S. Dept. - Technical Report CS0910-revised, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
0004743521
-
Power Analysis of the Key Scheduling of the AES Candidates
-
Rome, Mar. 22-23
-
E. Biham, A. Shamir, Power Analysis of the Key Scheduling of the AES Candidates, presented at the 2nd AES Candidate Conference, Rome, Mar. 22-23 1999.
-
(1999)
2nd AES Candidate Conference
-
-
Biham, E.1
Shamir, A.2
-
6
-
-
3042641393
-
On the Importance of Eliminating Errors in Cryptographic Computations
-
D. Boneh, R.A. DeMillo, R.J. Lipton, On the Importance of Eliminating Errors in Cryptographic Computations, J. Cryptology 14(2), pp. 101-119, 2001.
-
(2001)
J. Cryptology
, vol.14
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
8
-
-
0012022904
-
A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards
-
Rome, Italy, March 22-23
-
S. Chari, C. Jutla, J.R. Rao, P. Rohatgi, A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards, presented at the Second AES Candidate Conference, Rome, Italy, March 22-23, 1999.
-
(1999)
Second AES Candidate Conference
-
-
Chari, S.1
Jutla, C.2
Rao, J.R.3
Rohatgi, P.4
-
9
-
-
23044474213
-
A White-Box des Implementation for DRM Applications
-
Proceedings of DRM 2002 - 2nd ACM Workshop on Digital Rights Management, Nov. 18, Springer-Verlag to appear
-
S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, A White-Box DES Implementation for DRM Applications, Proceedings of DRM 2002 - 2nd ACM Workshop on Digital Rights Management, Nov. 18, 2002 (Springer-Verlag LNCS, to appear).
-
(2002)
LNCS
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.C.4
-
10
-
-
84947229190
-
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs
-
Proceedings of ISC 2001 - Information Security, 4th International Conference Malaga, Spain, 1-3 October 2001, Springer-Verlag
-
S. Chow, Y. Gu, H. Johnson, V.A. Zakharov, An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs, pp. 144-155, Proceedings of ISC 2001 - Information Security, 4th International Conference (Malaga, Spain, 1-3 October 2001), LNCS 2200, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2200
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.A.4
-
11
-
-
0027684663
-
Operating System Protection Through Program Evolution
-
1 Oct.
-
F. Cohen, Operating System Protection Through Program Evolution, Computers and Security 12(6), 1 Oct. 1993, pp. 565-584.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
12
-
-
0004777155
-
Resistance Against Implementation Attacks: A Comparative Study of the AES proposals
-
Rome, Italy, March 22-23
-
J. Daemen, V. Rijmen, Resistance Against Implementation Attacks: A Comparative Study of the AES proposals, presented at the Second AES Candidate Conference, Rome, Italy, March 22-23, 1999.
-
(1999)
Second AES Candidate Conference
-
-
Daemen, J.1
Rijmen, V.2
-
13
-
-
84974694661
-
Bitslice Ciphers and Power Analysis Attacks
-
7th International Workshop on East Software Encryption - FSE 2000 Springer-Verlag
-
J. Daemen, M. Peeters, G. van Assche, Bitslice Ciphers and Power Analysis Attacks, pp. 134-149, 7th International Workshop on East Software Encryption - FSE 2000 (LNCS 1978), Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1978
, pp. 134-149
-
-
Daemen, J.1
Peeters, M.2
Van Assche, G.3
-
16
-
-
0030697765
-
Building Diverse Computer Systems
-
IEEE Computer Society Press
-
S. Forrest, A. Somayaji, D. H. Ackley, Building Diverse Computer Systems, pp. 67-72, Proceedings of the 6th Workshop on Hot Topics in Operating Systems, IEEE Computer Society Press, 1997.
-
(1997)
Proceedings of the 6th Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
17
-
-
23044532702
-
Discouraging Software Piracy Using Software Aging
-
Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001 Springer-Verlag
-
M. Jakobsson, M.K. Reiter, Discouraging Software Piracy Using Software Aging, pp. 1-12, Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001 (LNCS 2320), Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 1-12
-
-
Jakobsson, M.1
Reiter, M.K.2
-
18
-
-
84943632039
-
Timing Attacks against Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - Crypto '96 Springer-Verlag
-
P.C. Kocher, Timing Attacks against Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, pp. 104-113, Advances in Cryptology - Crypto '96 (LNCS 1109), Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
19
-
-
84939573910
-
Differential Power Analysis
-
Advances in Cryptology - Crypto '99 Springer-Verlag
-
P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, pp. 388-397, Advances in Cryptology - Crypto '99 (LNCS 1666), Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
20
-
-
85093467807
-
Design Principles for Tamper-Resistant Smartcard Processors
-
USENIX Association, ISBN 1-880446-34-0
-
O. Kömmerling, M.G. Kuhn, Design Principles for Tamper-Resistant Smartcard Processors, pp. 9-20, Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99), USENIX Association, ISBN 1-880446-34-0, 1999.
-
(1999)
Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99)
, pp. 9-20
-
-
Kömmerling, O.1
Kuhn, M.G.2
-
21
-
-
0024029607
-
Efficient and Portable Combined Random Number Generators
-
P. L'Ecuyer, Efficient and Portable Combined Random Number Generators, Communications of the ACM 31(6), pp. 742-749, 1988.
-
(1988)
Communications of the ACM
, vol.31
, Issue.6
, pp. 742-749
-
-
L'Ecuyer, P.1
-
22
-
-
35248828253
-
-
November 1
-
National Institute of Standards and Technology (NIST), Round 2 Discussion Issues for the AES Development Effort, November 1, 1999. http://csrc.nist.gov/encryption/aes/round2/Round2WhitePaper.htm.
-
(1999)
Round 2 Discussion Issues for the AES Development Effort
-
-
-
23
-
-
0003508558
-
-
FIPS Publication 197, 26 Nov.
-
National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), FIPS Publication 197, 26 Nov. 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
25
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
Mobile Agent Security Springer-Verlag
-
T. Sander, C.F. Tschudin, Protecting Mobile Agents Against Malicious Hosts, pp. 44-60, Mobile Agent Security (LNCS 1419), Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
26
-
-
84956866637
-
Playing Hide and Seek with Keys
-
Financial Cryptography '99 Springer-Verlag
-
N. van Someren, A. Shamir, Playing Hide and Seek with Keys, pp. 118-124, Financial Cryptography '99 (LNCS 1648), Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1648
, pp. 118-124
-
-
Van Someren, N.1
Shamir, A.2
|