-
1
-
-
84958979095
-
Weierstraß elliptic curves and side-channel attacks
-
É. Brier and M. Joye. Weierstraß elliptic curves and side-channel attacks. PKC'02, LNCS 2274, pages 335-345.
-
PKC'02, LNCS
, vol.2274
, pp. 335-345
-
-
Brier, É.1
Joye, M.2
-
2
-
-
33645605146
-
Supplement to implementation of a new primality test
-
H. Cohen and A. K. Lenstra. Supplement to implementation of a new primality test. Mathematics of Computation, 48(177): S1-S4, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
-
-
Cohen, H.1
Lenstra, A.K.2
-
3
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
J.-S. Coron. Resistance against differential power analysis for elliptic curve cryptosystems. CHES'99, LNCS 1717, pages 292-302.
-
CHES'99, LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
4
-
-
35248815162
-
Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor
-
C. H. Gebotys and R. J. Gebotys. Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor. CHES'02, LNCS 2523, pages 114-128.
-
CHES'02, LNCS
, vol.2523
, pp. 114-128
-
-
Gebotys, C.H.1
Gebotys, R.J.2
-
5
-
-
33645584365
-
On insecurity of the side channel attack on xtr
-
To appear. The Institute of Electronics, Information and Communication Engineers
-
D.-G. Han, J. Lim, and K. Sakurai. On insecurity of the side channel attack on xtr. In The 2004 Symposium on Cryptography and Information Security (SCIS'04), page To appear. The Institute of Electronics, Information and Communication Engineers, 2004.
-
(2004)
The 2004 Symposium on Cryptography and Information Security (SCIS'04)
-
-
Han, D.-G.1
Lim, J.2
Sakurai, K.3
-
6
-
-
35248898400
-
Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA
-
K. Itoh, T. Izu, and M. Takenaka. Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA. CHES'02, LNCS 2523, pages 129-143.
-
CHES'02, LNCS
, vol.2523
, pp. 129-143
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
7
-
-
23944497026
-
Exceptional procedure attack on elliptic curve cryptosystems
-
T. Izu and T. Takagi. Exceptional procedure attack on elliptic curve cryptosystems. PKC'03, LNCS 2567, pages 224-239.
-
PKC'03, LNCS
, vol.2567
, pp. 224-239
-
-
Izu, T.1
Takagi, T.2
-
8
-
-
85062143504
-
Hessian elliptic curves and side-channel attacks
-
M. Joye and J.-J. Quisquater. Hessian elliptic curves and side-channel attacks. CHES'01, LNCS 2162, pages 93-100.
-
CHES'01, LNCS
, vol.2162
, pp. 93-100
-
-
Joye, M.1
Quisquater, J.-J.2
-
9
-
-
84944901711
-
Protection against differential power analysis for elliptic curve cryptography - An algebraic approach
-
M. Joye and C. Tymen. Protection against differential power analysis for elliptic curve cryptography - an algebraic approach. CHES'01, LNCS 2162, pages 377-390.
-
CHES'01, LNCS
, vol.2162
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
10
-
-
35248874869
-
The Montgomery powering ladder
-
M. Joye and S.-M. Yen. The Montgomery powering ladder. CHES'02, LNCS 2523, pages 291-302.
-
CHES'02, LNCS
, vol.2523
, pp. 291-302
-
-
Joye, M.1
Yen, S.-M.2
-
11
-
-
35248868313
-
Hidden markov model cryptanalysis
-
C. Karlof and D.Wagner. Hidden markov model cryptanalysis. CHES'03, LNCS 2779, pages 17-34.
-
CHES'03, LNCS
, vol.2779
, pp. 17-34
-
-
Karlof, C.1
Wagner, D.2
-
12
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Crypto'96,LNCS 1109, pages 104-113.
-
Crypto'96,LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
13
-
-
84939573910
-
Differential power analysis
-
P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Crypto'99, LNCS 1666, pages 388-397.
-
Crypto'99, LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
14
-
-
0346801364
-
Computer technology applied to the theory of numbers
-
Math. Assoc. Amer. (distributed by Prentice-Hall, Englewood Cliffs, N.J.)
-
D. H. Lehmer. Computer technology applied to the theory of numbers. Studies in Number Theory, volume 6 of MAA Studies in Mathematics, pages 117-151. Math. Assoc. Amer. (distributed by Prentice-Hall, Englewood Cliffs, N.J.), 1969.
-
(1969)
Studies in Number Theory, Volume 6 of MAA Studies in Mathematics
, vol.6
, pp. 117-151
-
-
Lehmer, D.H.1
-
15
-
-
84957881669
-
Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields
-
A. K. Lenstra. Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields. ACISP'97, LNCS 1270, pages 127-138.
-
ACISP'97, LNCS
, vol.1270
, pp. 127-138
-
-
Lenstra, A.K.1
-
18
-
-
84944898712
-
Preventing SPA/DPA in ECC systems using the Jacobi form
-
P.-Y. Liardet and N. P. Smart. Preventing SPA/DPA in ECC systems using the Jacobi form. CHES'01, LNCS 2162, pages 391-401.
-
CHES'01, LNCS
, vol.2162
, pp. 391-401
-
-
Liardet, P.-Y.1
Smart, N.P.2
-
19
-
-
84949514743
-
Power analysis attacks on modular exponentiation in smartcards
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power analysis attacks on modular exponentiation in smartcards. CHES'99, LNCS 1717, pages 144-157.
-
CHES'99, LNCS
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
20
-
-
0347502150
-
-
Revised (1992) version from ftp.cwi.nl: /pub/pmontgom/Lucas.ps.gz
-
m-n) via Lucas chains. Revised (1992) version from ftp.cwi.nl: /pub/pmontgom/Lucas.ps.gz, 1983.
-
(1983)
m-n) Via Lucas Chains
-
-
Montgomery, P.L.1
-
21
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems secure against timing attack
-
K. Okeya and K. Sakurai. Power analysis breaks elliptic curve cryptosystems secure against timing attack. Indocrypt'00, LNCS 1977, pages 178-190.
-
Indocrypt'00, LNCS
, vol.1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
22
-
-
84944889933
-
Randomized addition-subtraction chains as a countermeasure against power attacks
-
E. Oswald and M. Aigner. Randomized addition-subtraction chains as a countermeasure against power attacks. CHES'01, LNCS 2162, pages 39-50.
-
CHES'01, LNCS
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
23
-
-
68549107606
-
Protecting smart cards from passive power analysis with detached power supplies
-
A. Shamir. Protecting smart cards from passive power analysis with detached power supplies. CHES'00, LNCS 1965, pages 71-77.
-
CHES'00, LNCS
, vol.1965
, pp. 71-77
-
-
Shamir, A.1
-
25
-
-
35248854585
-
Efficient subgroup exponentiation in quadratic and sixth degree extensions
-
M. Stam and A. K. Lenstra. Efficient subgroup exponentiation in quadratic and sixth degree extensions. CHES'02, LNCS 2523, pages 318-332.
-
CHES'02, LNCS
, vol.2523
, pp. 318-332
-
-
Stam, M.1
Lenstra, A.K.2
-
26
-
-
24744463146
-
Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks
-
E. Trichina and A. Bellezza. Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks. CHES'02, LNCS 2523, pages 98-113.
-
CHES'02, LNCS
, vol.2523
, pp. 98-113
-
-
Trichina, E.1
Bellezza, A.2
|