-
2
-
-
84983134283
-
Differential Fault Attacks on Elliptic Curve Cryptosystems
-
CRYPTO 2000, Springer-Verlag
-
I. Biehl, B. Meyer, and V. Müller, "Differential Fault Attacks on Elliptic Curve Cryptosystems", CRYPTO 2000, LNCS 1880, pp.131-146, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 131-146
-
-
Biehl, I.1
Meyer, B.2
Müller, V.3
-
4
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults"
-
Eurocrypt'97, Springer-Verlag
-
D. Boneh, R. DeMillo, and R. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults", Eurocrypt'97, LNCS 1233, pp.37-51, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
5
-
-
84958979095
-
Weierstraß Elliptic Curves and Side-Channel Attacks
-
PKC 2002, Springer-Verlag
-
E. Brier and M. Joye, "Weierstraß Elliptic Curves and Side-Channel Attacks", PKC 2002, LNCS 2274, pp.335-345, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
7
-
-
84947743704
-
Efficient Elliptic Curve Exponentiation using Mixed Coordinates
-
Asiacrypt'98, Springer-Verlag
-
H. Cohen, A. Miyaji and T. Ono, "Efficient Elliptic Curve Exponentiation using Mixed Coordinates", Asiacrypt'98, LNCS 1514, Springer-Verlag, pp.51-65, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
10
-
-
84944884283
-
Hessian Elliptic Curves and Side-Channel Attacks
-
CHES 2001, Springer-Verlag
-
M. Joye and J. Quisqiater, "Hessian Elliptic Curves and Side-Channel Attacks", CHES 2001, LNCS 2162, pp.412-420, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 412-420
-
-
Joye, M.1
Quisqiater, J.2
-
11
-
-
84939573910
-
Differential Power Analysis
-
Crypto'99, Springer-Verlag
-
C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", Crypto'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, C.1
Jaffe, J.2
Jun, B.3
-
12
-
-
0005243827
-
-
Technical report CORR 98-05, University of Waterloo
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, "An Efficient Protocol for Authenticated Key Agreement", Technical report CORR 98-05, University of Waterloo, 1998.
-
(1998)
An Efficient Protocol for Authenticated Key Agreement
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
13
-
-
84944898712
-
Preventing SPA/DPA in ECC System using the Jacobi Form
-
CHES 2001, Springer-Verlag
-
P. Liardet and N. Smart, "Preventing SPA/DPA in ECC System using the Jacobi Form", CHES 2001, LNCS 2162, pp.401-411, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 401-411
-
-
Liardet, P.1
Smart, N.2
-
14
-
-
84957794840
-
Elliptic Curves with the Montgomery Form and their cryptographic Applications
-
PKC 2000, Springer-Verlag
-
K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic Curves with the Montgomery Form and their cryptographic Applications", PKC 2000, LNCS 1751, pp.446-465, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 446-465
-
-
Okeya, K.1
Kurumatani, H.2
Sakurai, K.3
-
17
-
-
84944876350
-
The Hessian Form of an Elliptic Curve
-
CHES 2001, Springer-Verlag
-
N. Smart, "The Hessian Form of an Elliptic Curve", CHES 2001, LNCS 2162, pp.118-125, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 118-125
-
-
Smart, N.1
|