-
2
-
-
35248836120
-
Password Interception in a SSL/TSL Channel
-
D. Boneh (ed.): Crypto 2003, Springer, Heidelberg
-
B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux: Password Interception in a SSL/TSL Channel. In: D. Boneh (ed.): Crypto 2003, Lecture Notes in Computer Science 2729, Springer, Heidelberg (2003), 583-599.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
3
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith: Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. Cryptology 10 (no. 4) (1997) 233-260.
-
(1997)
J. Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
4
-
-
84954462346
-
A practical implementation of the timing attack
-
J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Berlin
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P.-A. Mestré, J.-J. Quisquater, J.-L. Willems: A Practical Implementation of the Timing Attack. In: J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Lecture Notes in Computer Science 1820, Berlin (2000), 175-191.
-
(2000)
Lecture Notes in Computer Science
, vol.1820
, pp. 175-191
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.-A.4
Quisquater, J.-J.5
Willems, J.-L.6
-
5
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
-
N. Koblitz (ed.): Crypto 1996, Springer, Heidelberg
-
P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In: N. Koblitz (ed.): Crypto 1996, Springer, Lecture Notes in Computer Science 1109, Heidelberg (1996), 104-113.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
6
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
Ç.K. Koç, D. Naccache, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2001, Springer, Berlin
-
K. Gandolfi, G. Mourtel, F. Olivier: Electromagnetic Analysis: Concrete Results. In: Ç.K. Koç, D. Naccache, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2001, Springer, Lecture Notes in Computer Science 2162, Berlin (2001), 251-261.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, G.2
Olivier, F.3
-
7
-
-
24144497857
-
A timing attack against Rijndael
-
Catholic University of Louvain, Crypto Group
-
F. Koeune, J.-J. Quisquater: A Timing Attack against Rijndael. Catholic University of Louvain, Crypto Group, Technical report CG-1999/1, 1999.
-
(1999)
Technical Report
, vol.CG-1999-1
-
-
Koeune, F.1
Quisquater, J.-J.2
-
8
-
-
84939573910
-
Differential power analysis
-
M. Wiener (ed.): Crypto 1999, Springer, Berlin
-
P. Kocher, J. Jaffe, B. Jub: Differential Power Analysis. In: M. Wiener (ed.): Crypto 1999, Springer, Lecture Notes in Computer Science 1666, Berlin (1999), 388-397.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jub, B.3
-
10
-
-
33645597409
-
Probabilistic and statistical methods in cryptology. An introduction by selected topics
-
Springer, Berlin
-
D. Neuenschwander: Probabilistic and Statistical Methods in Cryptology. An Introduction by Selected Topics. Springer, Lecture Notes in Computer Science 3028, Berlin (2004).
-
(2004)
Lecture Notes in Computer Science
, vol.3028
-
-
Neuenschwander, D.1
-
11
-
-
33645606527
-
Exact analysis of montgomery multiplication
-
TU Darmstadt
-
H. Sato, D. Schepers, T. Takagi: Exact Analysis of Montgomery Multiplication. TU Darmstadt, Technical Report TI-6/04.
-
Technical Report
, vol.TI-6-04
-
-
Sato, H.1
Schepers, D.2
Takagi, T.3
-
12
-
-
84983436061
-
Optimized timing attacks against public key cryptosystems
-
W. Schindler: Optimized Timing Attacks against Public Key Cryptosystems. Statist. Decisions 20 (2002), 191-210.
-
(2002)
Statist. Decisions
, vol.20
, pp. 191-210
-
-
Schindler, W.1
-
13
-
-
68549092451
-
A timing attack against RSA with the chinese remainder theorem
-
Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Berlin
-
W. Schindler: A Timing Attack against RSA with the Chinese Remainder Theorem. In: Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Lecture Notes in Computer Science 1965, Berlin (2000), 110-125.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 110-125
-
-
Schindler, W.1
-
14
-
-
18844409918
-
Unleashing the full power of timing attack
-
Catholic University of Louvain
-
W. Schindler, F. Koeune, J.-J. Quisquater: Unleashing the Full Power of Timing Attack. Catholic University of Louvain, Technical Report CG-2001/3.
-
Technical Report
, vol.CG-2001-3
-
-
Schindler, W.1
Koeune, F.2
Quisquater, J.-J.3
-
15
-
-
84946828535
-
Improving divide and conquer attacks against cryptosystems by better error detection / correction strategies
-
B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Berlin
-
W. Schindler, F. Koeune, J.-J. Quisquater: Improving Divide and Conquer Attacks Against Cryptosystems by Better Error Detection / Correction Strategies. In: B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Lecture Notes in Computer Science 2260, Berlin (2001), 245-267.
-
(2001)
Lecture Notes in Computer Science
, vol.2260
, pp. 245-267
-
-
Schindler, W.1
Koeune, F.2
Quisquater, J.-J.3
-
16
-
-
84958960266
-
A combined timing and power attack
-
P. Paillier, D. Naccache (eds.): Public Key Cryptography - PKC 2002, Springer, Berlin
-
W. Schindler: A Combined Timing and Power Attack. In: P. Paillier, D. Naccache (eds.): Public Key Cryptography - PKC 2002, Springer, Lecture Notes in Computer Science 2274, Berlin (2002), 263-279.
-
(2002)
Lecture Notes in Computer Science
, vol.2274
, pp. 263-279
-
-
Schindler, W.1
-
17
-
-
33645591077
-
More detail for a combined timing and power attack against implementations of RSA
-
K.G. Paterson (ed.): Cryptography and Coding - IMA 2003, Springer, Berlin
-
W. Schindler, C. Walter: More Detail for a Combined Timing and Power Attack against Implementations of RSA. In: K.G. Paterson (ed.): Cryptography and Coding - IMA 2003, Springer, Lecture Notes in Computer Science 2898, Berlin (2003), 245-263.
-
(2003)
Lecture Notes in Computer Science
, vol.2898
, pp. 245-263
-
-
Schindler, W.1
Walter, C.2
-
18
-
-
84944900219
-
Precise bounds for montgomery montgomery modular multiplication and some potentially insecure RSA moduli
-
B. Preneel (ed.): Topics in Cryptology - CT-RSA 2002, Springer, Berlin
-
C.D. Walter: Precise Bounds for Montgomery Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. In: B. Preneel (ed.): Topics in Cryptology - CT-RSA 2002, Springer, Lecture Notes in Computer Science 2271, Berlin (2002), 30-39.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 30-39
-
-
Walter, C.D.1
-
19
-
-
84937560280
-
Distinguishing exponent digits by observing modular subtractions
-
D. Naccache (ed.): Topics in Cryptology - CT-RSA 2001, Springer, Berlin
-
C.D. Walter, S. Thompson: Distinguishing Exponent Digits by Observing Modular Subtractions. In: D. Naccache (ed.): Topics in Cryptology - CT-RSA 2001, Springer, Lecture Notes in Computer Science 2020, Berlin (2001), 192-207.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
|