-
1
-
-
35248871165
-
Zero-value point attacks on elliptic curve crytosystems
-
[AT03], LNCS, Springer-Verlag
-
[AT03] T. AKISHITA, T. TAKAGI. Zero-value point attacks on elliptic curve crytosystems. In: ISO 2003, vol. 2851, LNCS, pp. 218-233, Springer-Verlag, 2003.
-
(2003)
ISO 2003
, vol.2851
, pp. 218-233
-
-
Akishita, T.1
Takagi, T.2
-
2
-
-
84937564555
-
Software implementation of the NIST elliptic curves over prime fields
-
[BHLM01], D. Naccache, editor, LNCS
-
[BHLM01] M. BROWN, D. HANKERSON, J. LOPEZ, A. MENEZES. Software implementation of the NIST elliptic curves over prime fields. In: Progress in Cryptology CT-RSA 2001, D. Naccache, editor, vol 2020, LNCS, pp. 250-265, 2001.
-
(2001)
Progress in Cryptology CT-RSA 2001
, vol.2020
, pp. 250-265
-
-
Brown, M.1
Hankerson, D.2
Lopez, J.3
Menezes, A.4
-
3
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
[CMO98], K. Ohta and D. Pei, editors, LNCS
-
[CMO98] H. COHEN, A. MIYAJI, T. ONO. Efficient elliptic curve exponentiation using mixed coordinates. In: Advances in cryptology-Asiacrypt'98, K. Ohta and D. Pei, editors, vol 1514, LNCS, pp. 51-65, 1998.
-
(1998)
Advances in Cryptology-Asiacrypt'98
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
4
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
[Cor99], C.K. Koç and C. Paar, editors, LNCS
-
[Cor99] J.S. CORON. Resistance against differential power analysis for elliptic curve cryptosystems. In: Cryptography Hardware and Embedded Systems-CHES'99, C.K. Koç and C. Paar, editors, vol 1717, LNCS, pp. 292-302, 1999.
-
(1999)
Cryptography Hardware and Embedded Systems-CHES'99
, vol.1717
, pp. 292-302
-
-
Coron, J.S.1
-
5
-
-
2642526170
-
Power attacks on a side-channel resistant elliptic curve implementation
-
[GS04], W. GEISELMANN, R. STEINWANDT
-
[GS04] W. GEISELMANN, R. STEINWANDT. Power attacks on a side-channel resistant elliptic curve implementation, Information Processing Letters, vol 91, pp. 29-32, 2004.
-
(2004)
Information Processing Letters
, vol.91
, pp. 29-32
-
-
-
6
-
-
35248816371
-
A refined power-analysis attack on elliptic curve cryptosystems
-
[Gou03], LNCS
-
[Gou03] L. GOUBIN. A refined power-analysis attack on elliptic curve cryptosystems. In: Public Key Cryptography International Workshop-PKC 2003, vol 2567, LNCS, pp. 199-210, 2003.
-
(2003)
Public Key Cryptography International Workshop-PKC 2003
, vol.2567
, pp. 199-210
-
-
Goubin, L.1
-
7
-
-
27244452101
-
Efficient countermeaaures against power analysis for elliptic curve cryptosystems
-
[IIT04], T. Izu, M. TAKBNAKA
-
[IIT04] K. ITOH, T. Izu, M. TAKBNAKA. Efficient countermeaaures against power analysis for elliptic curve cryptosystems. In: Proceedings of CARDIS-WGC 2004.
-
Proceedings of CARDIS-WGC 2004
-
-
Itoh, K.1
-
8
-
-
23044530386
-
Hessian elliptic curves and side-channel attacks
-
[JQ01], C.K. Koç, D. Naccache and C. Paar, editors, LNCS
-
[JQ01] M. JOYE, J.J. QUISQUATER, Hessian elliptic curves and side-channel attacks. In: Cryptography Hardware and Embedded Systems-CHES'01, C.K. Koç, D. Naccache and C. Paar, editors, vol 2162, LNCS, pp. 412-420, 2001.
-
(2001)
Cryptography Hardware and Embedded Systems-CHES'01
, vol.2162
, pp. 412-420
-
-
Joye, M.1
Quisquater, J.J.2
-
9
-
-
23044531203
-
Protections against differential analysis for elliptic curve cryptography: An algebraic approach
-
[JT01], C. Koç, D. Naccache and C. Paar, editors, LNCS
-
[JT01] M. JOYE, C. TYMEN. Protections against differential analysis for elliptic curve cryptography: an algebraic approach. In: Cryptography Hardware and Embedded Systems-CHES'01, C. Koç, D. Naccache and C. Paar, editors, vol 2162, LNCS, pp. 386-400, 2001.
-
(2001)
Cryptography Hardware and Embedded Systems-CHES'01
, vol.2162
, pp. 386-400
-
-
Joye, M.1
Tymen, C.2
-
10
-
-
84939573910
-
Differential power analysis
-
[KJJ99], P. KOCHER, J. JAFFE, B. JUN, M. Wiener, editor, LNCS
-
[KJJ99] P. KOCHER, J. JAFFE, B. JUN. Differential power analysis. In: Advances in Cryptology-CRYPTO'99, M. Wiener, editor, vol 1666, LNCS, pp. 388-397, 1999.
-
(1999)
Advances in Cryptology-CRYPTO'99
, vol.1666
, pp. 388-397
-
-
-
11
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSA and other systems
-
[Koc96], N. Koblitz, editor, LNCS
-
[Koc96] P. KOCHER. Timing attacks on implementations of Diffie-Hellman, RSA, DSA and other systems. In: Advances in Cryptology-CRYPTO'96, N. Koblitz, editor, vol 1109, LNCS, pp. 104-113, 1996.
-
(1996)
Advances in Cryptology-CRYPTO'96
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
12
-
-
84947913604
-
m) without precomputation
-
[LD99], C. Koç and C. Paar, editors, LNCS
-
m) without precomputation. In: Cryptography Hardware and Embedded Systems CHES'99, C. Koç and C. Paar, editors, vol 1717, LNCS, pp. 316-327, 1999.
-
(1999)
Cryptography Hardware and Embedded Systems CHES'99
, vol.1717
, pp. 316-327
-
-
Lopez, J.1
Dahab, R.2
-
13
-
-
84955368946
-
More flexible exponentiation with precomputation
-
[LL94], LNCS
-
[LL94] C. LIM, P. LEE. More flexible exponentiation with precomputation. In: Advances in Cryptology-CRYPTO'94, vol 839, LNCS, pp. 95-107, 1994.
-
(1994)
Advances in Cryptology-CRYPTO'94
, vol.839
, pp. 95-107
-
-
Lim, C.1
Lee, P.2
-
14
-
-
23044530344
-
Preventing SPA/DPA in ECC systems using the Jacobi form
-
[LS01], P.V. LIARDET, N. SMART, C. Koç, D. Naccache and C. Paar, editors, LNCS
-
[LS01] P.V. LIARDET, N. SMART. Preventing SPA/DPA in ECC systems using the Jacobi form. In Cryptography Hardware and Embedded Systems-CHES'01, C. Koç, D. Naccache and C. Paar, editors, vol 2162, LNCS, pp. 401-411, 2001.
-
(2001)
Cryptography Hardware and Embedded Systems-CHES'01
, vol.2162
, pp. 401-411
-
-
-
15
-
-
35048860937
-
Efficient Countermeasures against RPA, DPA, and SPA
-
[MMM04], H. MAMIYA, A. MIYAJI, H. MORIMOTO, M. Joye, J.J. Quisquater, editors, LNCS
-
[MMM04] H. MAMIYA, A. MIYAJI, H. MORIMOTO. Efficient Countermeasures against RPA, DPA, and SPA. In Cryptography Hardware and Embedded Systems-CHES'04, M. Joye, J.J. Quisquater, editors, vol 3156, LNCS, pp. 343-356, 2004.
-
(2004)
Cryptography Hardware and Embedded Systems-CHES'04
, vol.3156
, pp. 343-356
-
-
-
16
-
-
84947262754
-
Securing elliptic curve point multiplication against side-channel attacks
-
[Möl01], G.I. Davida and Y. Frankel, editors, LNCS
-
[Möl01] B. MÖLLER. Securing elliptic curve point multiplication against side-channel attacks. In: Information Security, G.I. Davida and Y. Frankel, editors, vol 2200, LNCS, pp. 324-334, 2001.
-
(2001)
Information Security
, vol.2200
, pp. 324-334
-
-
Möller, B.1
-
17
-
-
84968484435
-
Speeding up the Pollard and elliptic curve methods of factorization
-
[Mon87], January
-
[Mon87] P.L. MONTGOMERY. Speeding up the Pollard and elliptic curve methods of factorization, Mathematics of Computation, 48(177), pp. 243-264, January 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
18
-
-
84945314413
-
A Second-Order DPA attacks breaks a window-method based countermeasure against side channel attacks
-
[OS02], Information Security Conference (ISC 2002)
-
[OS02] K. OKEYA, K. SAKURAI. A Second-Order DPA attacks breaks a window-method based countermeasure against side channel attacks, Information Security Conference (ISC 2002), LNCS 2433, pp. 389-401, 2002.
-
(2002)
LNCS
, vol.2433
, pp. 389-401
-
-
Okeya, K.1
Sakurai, K.2
|