-
1
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Advances in Cryptology - EURO-CRYPT'97, Springer-Verlag
-
Dan Boneh, Richard A. DeMillo, and Richard J. Lipton, "On the importance of checking cryptographic protocols for faults," Advances in Cryptology - EURO-CRYPT'97, Lecture Notes in Computer Science 1233, pp. 37-51, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
2
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
Cryptographic Hardware and Embedded Systems - CHES'99, Springer-Verlag
-
Jean-Sébastien Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," Cryptographic Hardware and Embedded Systems - CHES'99, Lecture Notes in Computer Science 1717, pp. 292-302, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
3
-
-
35248881073
-
The doubling attack - Why upwards is better than downwards
-
Cryptographic Hardware and Embedded Systems - CHES'03, Springer-Verlag
-
Pierre-Alain Fouque and Frederic Valette, "The Doubling Attack - Why Upwards Is Better than Downwards," Cryptographic Hardware and Embedded Systems - CHES'03, Lecture Notes in Computer Science 2779, pp. 269-280, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2779
, pp. 269-280
-
-
Fouque, P.-A.1
Valette, F.2
-
4
-
-
35048852643
-
Defeating countermeasures based on randomized BSD representations
-
Cryptographic Hardware and Embedded Systems - CHES'04, Springer-Verlag
-
Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, and Frédéric Valette, "Defeating Countermeasures Based on Randomized BSD Representations," Cryptographic Hardware and Embedded Systems - CHES'04, Lecture Notes in Computer Science 3156, pp. 312-327, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 312-327
-
-
Fouque, P.-A.1
Muller, F.2
Poupard, G.3
Valette, F.4
-
5
-
-
35248877672
-
Randomized signed-scalar multiplication of ECC to resist power attacks
-
Cryptographic Hardware and Embedded Systems - CHES'02, Springer-Verlag
-
JaeCheol Ha and SangJae Moon, "Randomized signed-scalar multiplication of ECC to resist power attacks," Cryptographic Hardware and Embedded Systems - CHES'02, Lecture Notes in Computer Science 2523, pp. 551-563, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2523
, pp. 551-563
-
-
Ha, J.1
Moon, S.2
-
6
-
-
35248868313
-
Hidden Markov model cryptanalysis
-
Cryptographic Hardware and Embedded Systems - CHES'03, Springer-Verlag
-
Chris Karlof and David Wagner, "Hidden Markov model cryptanalysis," Cryptographic Hardware and Embedded Systems - CHES'03, Lecture Notes in Computer Science 2779, pp. 17-34, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2779
, pp. 17-34
-
-
Karlof, C.1
Wagner, D.2
-
7
-
-
84943632039
-
Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Advanced in Cryptology - CRYPTO'96, Springer-Verlag
-
Paul Kocher, "Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems," Advanced in Cryptology - CRYPTO'96, Lecture Notes in Computer Science 1109, pp. 104-113, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
8
-
-
84939573910
-
Differential power analysis
-
Advanced in Cryptology - CRYPTO'99, Springer-Verlag
-
Paul Kocher, Joshua Jaffe, and Benjamin Jun, "Differential power analysis," Advanced in Cryptology - CRYPTO'99, Lecture Notes in Computer Science 1666, pp. 388-397, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
9
-
-
84949514743
-
Power analysis attacks of modular exponentiation in smartcards
-
Cryptographic Hardware and Embedded Systems (CHES'99), Springer-Verlag
-
Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards," Cryptographic Hardware and Embedded Systems (CHES'99), Lecture Notes in Computer Science 1717, pp. 144-157, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
10
-
-
84947425601
-
On insecurity of the side channel attack counter-measure using addition-subtraction chains under distinguishability between addition and doubling
-
Information Security and Privacy - ACISP'02, Springer-Verlag
-
Katsuyuki Okeya and Kouichi Sakurai, "On insecurity of the side channel attack counter-measure using addition-subtraction chains under distinguishability between addition and doubling," Information Security and Privacy - ACISP'02, Lecture Notes in Computer Science 2384, pp. 420-435, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 420-435
-
-
Okeya, K.1
Sakurai, K.2
-
11
-
-
0348155940
-
Side channel attack on Ha-Moon's countermeasure of randomized signed scalar multiplication
-
Progress in Cryptology - INDOCRYPT 2003, Springer-Verlag
-
Katsuyuki Okeya and Dong-Guk Han, "Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication," Progress in Cryptology - INDOCRYPT 2003, Lecture Notes in Computer Science 2904, pp. 334-348, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2904
, pp. 334-348
-
-
Okeya, K.1
Han, D.-G.2
-
12
-
-
84944889933
-
Randomized addition-subtraction chains as a countermeasure against power attacks
-
Cryptographic Hardware and Embedded Systems - CHES'01, Springer-Verlag
-
Elisabeth Oswald and Manfred Aigner, "Randomized addition-subtraction chains as a countermeasure against power attacks," Cryptographic Hardware and Embedded Systems - CHES'01, Lecture Notes in Computer Science 2162, pp. 39-50, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
13
-
-
84949979593
-
A countermeasure against one physical cryptanalysis may benefit another attack
-
Information Security and Cryptology - ICISC'01, Springer-Verlag
-
Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon, "A countermeasure against one physical cryptanalysis may benefit another attack," Information Security and Cryptology - ICISC'01, Lecture Notes in Computer Science 2288, pp. 414-427, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2288
, pp. 414-427
-
-
Yen, S.-M.1
Kim, S.2
Lim, S.3
Moon, S.4
|