-
3
-
-
84958979095
-
Weierstrass elliptic curves and side-channel attacks
-
LNCS 2274
-
Brier, E., Joye,: Weierstrass elliptic curves and side-channel attacks. Proc. Public Key Cryptography (PKC 2002), LNCS 2274 (2002) 335-345
-
(2002)
Proc. Public Key Cryptography (PKC 2002)
, pp. 335-345
-
-
Brier, E.1
Joye2
-
4
-
-
84937564555
-
Software implementation of the NIST elliptic curves over prime fields
-
LNCS 2020
-
Brown, M., Hankerson, D., Lopez, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. Proc. CT-RSA 2001, LNCS 2020 (2001) 250-265
-
(2001)
Proc. CT-RSA 2001
, pp. 250-265
-
-
Brown, M.1
Hankerson, D.2
Lopez, J.3
Menezes, A.4
-
6
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
Crypto'99, LNCS 1666
-
Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. Proc. Advances in Cryptology - Crypto'99, LNCS 1666 (1999) 398-412
-
(1999)
Proc. Advances in Cryptology
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
7
-
-
84880293917
-
Resistance against differential power analysis attacks for elliptic curve cryptosystems
-
LNCS 1717
-
Coron, J.-S.: Resistance against differential power analysis attacks for elliptic curve cryptosystems. Proc. Cryptographic Hardware and Embedded Systems (CHES'99), LNCS 1717 (1999) 292-302
-
(1999)
Proc. Cryptographic Hardware and Embedded Systems (CHES'99)
, pp. 292-302
-
-
Coron, J.-S.1
-
8
-
-
0000490812
-
A survey of fast exponentiation methods
-
Gordon, D. M.: A survey of fast exponentiation methods. J. Algorithms 27 (1998) 129-146
-
(1998)
J. Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.M.1
-
10
-
-
68549092452
-
Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems
-
LNCS 1965
-
Hasan, M. A.: Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems. Proc. Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965 (2000) 93-108
-
(2000)
Proc. Cryptographic Hardware and Embedded Systems (CHES 2000)
, pp. 93-108
-
-
Hasan, M.A.1
-
13
-
-
84958955271
-
A fast parallel elliptic curve multiplication resistant against side channel attacks
-
LNCS 2274
-
Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. Proc. Public Key Cryptography (PKC 2002), LNCS 2274 (2002) 280-296
-
(2002)
Proc. Public Key Cryptography (PKC 2002)
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
15
-
-
84944901711
-
Protection against Differential Power Analysis for elliptic curve cryptography - An algebraic approach
-
LNCS 2162
-
Joye, M., Tymen, Ch.: Protection against Differential Power Analysis for elliptic curve cryptography - An algebraic approach. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 377-390
-
(2001)
Proc. Cryptographic Hardware and Embedded Systems (CHES 2001)
, pp. 377-390
-
-
Joye, M.1
Tymen, Ch.2
-
17
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems
-
, LNCS 1109
-
Kocher, P.: Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems. Proc. Advances in Cryptology - Crypto'96, LNCS 1109 (1996) 104-113
-
(1996)
Proc. Advances in Cryptology - Crypto'96
, pp. 104-113
-
-
Kocher, P.1
-
18
-
-
84939573910
-
Differential power analysis
-
LNCS 1666
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. Proc. Advances in Cryptology - Crypto'99, LNCS 1666 (1999) 388-397
-
(1999)
Proc. Advances in Cryptology - Crypto'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
23
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T. S., Dabbish, E. A., Sloan, R. H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51 (5) (2002) 541-552
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
24
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Montgomery, P.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computations, 48 (1987) 243-264
-
(1987)
Mathematics of Computations
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
25
-
-
84947733936
-
Power analysis breaks Elliptic Curve cryptosystems even secure against the timing attacks
-
LNCS 1977
-
Okeya, K., Sakaurai, K.: Power analysis breaks Elliptic Curve cryptosystems even secure against the timing attacks. Proc. INDOCRYPT 2000, LNCS 1977 (2000) 178-190
-
(2000)
Proc. INDOCRYPT 2000
, pp. 178-190
-
-
Okeya, K.1
Sakaurai, K.2
-
27
-
-
84944906595
-
Non-deterministic processors
-
LNCS 2162
-
May, D., Muller, H.L., Smart, N.P.: Non-deterministic processors. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 28-38
-
(2001)
Proc. Cryptographic Hardware and Embedded Systems (CHES 2001)
, pp. 28-38
-
-
May, D.1
Muller, H.L.2
Smart, N.P.3
-
28
-
-
84949979593
-
A: Counter-measure against one physical cryptanalysis may benefit another attack
-
LNCS 2288
-
Yen, S-M., Kim, S-J., Lim, S-G., Moon, S-J: A counter-measure against one physical cryptanalysis may benefit another attack. Proc. Information Security and Cryptology (ICISC 2001), LNCS 2288 (2002) 414-427
-
(2002)
Proc. Information Security and Cryptology (ICISC 2001)
, pp. 414-427
-
-
Yen, S.-M.1
Kim, S.-J.2
Lim, S.-G.3
Moon, S.-J.4
-
30
-
-
84947730530
-
On the performance of signature schemes based on elliptic curves
-
LNCS 1423
-
De Win,. E., Mister, S., Preneel, B., Wiener M.: On the performance of signature schemes based on elliptic curves. Proc. An Algorithmic Number Theory Symposium, LNCS 1423 (1998)
-
(1998)
Proc. An Algorithmic Number Theory Symposium
-
-
De Win, E.1
Mister, S.2
Preneel, B.3
Wiener, M.4
-
31
-
-
0004742708
-
Elliptic curve cryptography on smart cards without coprocessors
-
September 20-22, Bristol, UK
-
Woodbury, A., Bailey, D., Paar, Gh.: Elliptic curve cryptography on smart cards without coprocessors. Proc. The Forth Smart Card Research and Advanced Applications Conf., September 20-22, 2000 Bristol, UK
-
(2000)
Proc. the Forth Smart Card Research and Advanced Applications Conf.
-
-
Woodbury, A.1
Bailey, D.2
Paar, Gh.3
|