-
1
-
-
84937438279
-
Power Analysis, What Is Now Possible
-
Akkar, M.-L., Bevan, R., Dischamp, P. and Moyart, D.: Power Analysis, What Is Now Possible..., in Proc. of ASIACRYPT 2000, pp. 489-502, 2000.
-
(2000)
Proc. of ASIACRYPT 2000
, pp. 489-502
-
-
Akkar, M.-L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
2
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
Alexi, W., Chor, B., Goldreich, O. and Schnorr, C.: RSA and Rabin functions: Certain parts are as hard as the whole, SIAM Journal on Computing, 17(2), pp. 194-209, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.4
-
3
-
-
0040320732
-
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
-
Bao, F., Deng, R.-H., Han, Y., Jeng, A., Narasimhalu, A.-D. and Ngair, T.: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults, in Proc. of Security Protocols '97, pp. 115-124, 1997.
-
(1997)
Proc. of Security Protocols '97
, pp. 115-124
-
-
Bao, F.1
Deng, R.-H.2
Han, Y.3
Jeng, A.4
Narasimhalu, A.-D.5
Ngair, T.6
-
4
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
October 20, 1995, originally published ACM, November
-
Bellare, M. and Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, October 20, 1995, originally published in Proc. of the First ACM Conference on Computer and Communications Security, ACM, November 1993.
-
(1993)
Proc. of the First ACM Conference on Computer and Communications Security
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84957693225
-
Chosen Ciphertexts Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1
-
Bleichenbacher, D.: Chosen Ciphertexts Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1, in Proc. of CRYPTO '98, pp. 1-12, 1998.
-
(1998)
Proc. of CRYPTO '98
, pp. 1-12
-
-
Bleichenbacher, D.1
-
6
-
-
0000552770
-
Twenty Years of Attacks on the RSA Cryplosysteins
-
Boneh, D.: Twenty Years of Attacks on the RSA Cryplosysteins, Notices of the American Mathematical Society, vol. 46, no. 2, pp. 203-213, 1999.
-
(1999)
Notices of the American Mathematical Society
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
7
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Boneh, D., DeMillo, R. A. and Lipton, R. J.: On the Importance of Checking Cryptographic Protocols for Faults, in Proc. of EUROCRYPT '97, pp. 37-51, 1997.
-
(1997)
Proc. of EUROCRYPT '97
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
8
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Chari, S., Jutla, C.-S., Rao, J. and Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks, in Proc. of CRYPTO '99, pp. 398-411, 1999.
-
(1999)
Proc. of CRYPTO '99
, pp. 398-411
-
-
Chari, S.1
Jutla, C.-S.2
Rao, J.3
Rohatgi, P.4
-
9
-
-
84957376046
-
Stronger Security Proofs for RSA and Rabin Bits
-
Fischlin, R. and Schnorr, C. P.: Stronger Security Proofs for RSA and Rabin Bits, in Proc. of EUROCRYPT '97, pp. 267-279, 1997.
-
(1997)
Proc. of EUROCRYPT '97
, pp. 267-279
-
-
Fischlin, R.1
Schnorr, C.P.2
-
10
-
-
0011189534
-
Stronger Security Proofs for RSA and Rabin Bits
-
IACR
-
Fischlin, R. and Schnorr, C. P.: Stronger Security Proofs for RSA and Rabin Bits, Journal of Cryptology, Vol. 13, No. 2, pp. 221-244, IACR, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 221-244
-
-
Fischlin, R.1
Schnorr, C.P.2
-
11
-
-
84880853825
-
RSA-OAEP Is Secure under the RSA Assumption, in
-
Fujisaki, E., Okamoto, T., Pointcheval, D. and Stem, J.: RSA-OAEP Is Secure under the RSA Assumption, in Proc. of CRYPTO 2001, pp. 260-274, 2001.
-
(2001)
Proc. of CRYPTO 2001
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stem, J.4
-
12
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results
-
Gandolfi, K., Mourtel, C. and Olivier, F.: Electromagnetic Analysis: Concrete Results, in Proc. of CHES 2001, pp. 251-261, 2001.
-
(2001)
Proc. of CHES
, vol.2001
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
13
-
-
0032305852
-
The Security of Individual RSA Bits
-
Håstad, J. and Näslund M.: The Security of Individual RSA Bits, in Proc. of FOCS '98, pp. 510-521, 1998.
-
(1998)
Proc. of FOCS '98
, pp. 510-521
-
-
Håstad, J.1
Näslund, M.2
-
14
-
-
84939573910
-
Differential Power Analysis: Leaking Secrets
-
Kocher, P., Jaffe, J. and Jun, B.: Differential Power Analysis: Leaking Secrets, in Proc. of CRYPTO '99, pp. 388-397, 1999.
-
(1999)
Proc. of CRYPTO '99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
33846862428
-
A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS#1, in
-
Manger, J.: A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS#1, in Proc. of CRYPTO 2001, pp. 230-238, 2001.
-
(2001)
Proc. of CRYPTO
, pp. 230-238
-
-
Manger, J.1
-
16
-
-
84904650499
-
Investigations of Power Analysis Attacks on Smartcards, in
-
Messegers, T.-S., Dabbish, E. A. and Sloan, R. H.: Investigations of Power Analysis Attacks on Smartcards, in Proc. of USENIX Workshop on Smartcard Technology, pp. 151-161, 1999.
-
(1999)
Proc. of USENIX Workshop on Smartcard Technology
, pp. 151-161
-
-
Messegers, T.-S.1
Dabbish, E.A.2
Sloan, R.H.3
-
17
-
-
33645982038
-
-
PKCS#1 v2.1: RSA Labs, DRAFT2, January 5
-
PKCS#1 v2.1: RSA Cryptography Standard, RSA Labs, DRAFT2, January 5 2001.
-
(2001)
RSA Cryptography Standard
-
-
-
19
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig S.C., Hellman M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory, 24 (1978), 106-110.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosysteins
-
Rivest, R., L., Shamir, A. and Adleman L.: A method for obtaining digital signatures and public-key cryptosysteins. Communications of the ACM, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
35248817868
-
-
Secure Hash Standard, FIPS Pub 180-1, 1995 April 17.
-
Secure Hash Standard, FIPS Pub 180-1, 1995 April 17.
-
-
-
-
24
-
-
84880904783
-
OAEP Reconsidered (Extended Abstract)
-
Shoup, V.: OAEP Reconsidered (Extended Abstract), in Proc. of CRYPTO 2001, pp. 239-259, 2001.
-
(2001)
Proc. of CRYPTO 2001
, pp. 239-259
-
-
Shoup, V.1
|