-
1
-
-
84947239944
-
Elliptic curve arithmetic using SIMD
-
ISC2001, Springer-Verlag
-
K. Aoki, F. Hoshino, T. Kobayashi, and H. Oguro, "Elliptic curve arithmetic using SIMD," ISC2001, LNCS 2200, pp.235-247, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2200
, pp. 235-247
-
-
Aoki, K.1
Hoshino, F.2
Kobayashi, T.3
Oguro, H.4
-
2
-
-
0027614379
-
2155
-
2155," IEEE J. Sel. Areas Commun., vol.11, no.5, pp.804-813, 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.5
, pp. 804-813
-
-
Agnew, G.1
Mullin, R.2
Vanstone, S.3
-
4
-
-
35248883676
-
Countermeasures against side-channel attacks for elliptic curve cryptosystems
-
A. Bellezza, "Countermeasures against side-channel attacks for elliptic curve cryptosystems," Cryptology ePrint Archive, 2001/103, 2001.
-
(2001)
Cryptology EPrint Archive
, vol.2001
, Issue.103
-
-
Bellezza, A.1
-
5
-
-
84958979095
-
Weierstraβ elliptic curves and side-channel attacks
-
PKC2002, Springer-Verlag
-
E. Brier and M. Joye, "Weierstraβ elliptic curves and side-channel attacks," PKC2002, LNCS 2274, pp.335-345, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
7
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
CHES'99, Springer-Verlag
-
J. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," CHES'99, LNCS 1717, pp.292-302, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.1
-
8
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
Asiacrypt'98, Springer-Verlag
-
H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," Asiacrypt'98, LNCS 1514, pp.51-65, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
9
-
-
84944905303
-
Universal exponentiation algorithm - A first step towards provable SPA-resistance
-
CHES2001, Springer-Verlag
-
C. Clavier and M. Joye, "Universal exponentiation algorithm - A first step towards provable SPA-resistance," CHES2001, LNCS 2162, pp.300-308, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 300-308
-
-
Clavier, C.1
Joye, M.2
-
11
-
-
0000490812
-
A survey of fast exponentiation methods
-
D. Gordon, "A survey of fast exponentiation methods," J. Algorithms, vol.27, pp.129-146, 1998.
-
(1998)
J. Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.1
-
13
-
-
35248898400
-
Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA
-
CHES 2002, Springer-Verlag
-
K. Itoh, T. Izu, and M. Takenaka, "Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA," CHES 2002, LNCS 2523, pp.129-143, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2523
, pp. 129-143
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
14
-
-
35248873415
-
A practical countermeasure against address-bit differential power analysis
-
CHES 2003, Springer-Verlag
-
K. Itoh, T. Izu, and M. Takenaka, "A practical countermeasure against address-bit differential power analysis," CHES 2003, LNCS 2779, pp.382-396, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2779
, pp. 382-396
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
15
-
-
84974665915
-
Improved elliptic curve multiplication methods resistant against side channel attacks
-
Indocrypt 2002
-
T. Izu, B. Möller, and T. Takagi, "Improved elliptic curve multiplication methods resistant against side channel attacks," Indocrypt 2002, LNCS 2551, pp.296-313, 2002.
-
(2002)
LNCS
, vol.2551
, pp. 296-313
-
-
Izu, T.1
Möller, B.2
Takagi, T.3
-
16
-
-
0842327123
-
A fast parallel elliptic curve multiplication resistant against side channel attacks
-
CORR 2002-03, University of Waterloo
-
T. Izu and T. Takagi, "A fast parallel elliptic curve multiplication resistant against side channel attacks," Technical Report of CACR, CORR 2002-03, University of Waterloo, 2002.
-
(2002)
Technical Report of CACR
-
-
Izu, T.1
Takagi, T.2
-
17
-
-
84958955271
-
A fast parallel elliptic curve multiplication resistant against side channel attacks
-
PKC 2002
-
T. Izu and T. Takagi, "A fast parallel elliptic curve multiplication resistant against side channel attacks," PKC 2002, LNCS 2274, pp.280-296, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
18
-
-
0842310312
-
Fast elliptic curve multiplications with SIMD operations
-
Jan.
-
T. Izu and T. Takagi, "Fast elliptic curve multiplications with SIMD operations," IEICE Trans. Fundamentals, vol.E87-A, no. 1, pp.85-93, Jan. 2004.
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.1
, pp. 85-93
-
-
Izu, T.1
Takagi, T.2
-
19
-
-
84944884283
-
Hessian elliptic curves and side-channel attacks
-
CHES2001, Springer-Verlag
-
M. Joye and J. Quisquater, "Hessian elliptic curves and side-channel attacks," CHES2001, LNCS 2162, pp.402-410, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 402-410
-
-
Joye, M.1
Quisquater, J.2
-
20
-
-
84944901711
-
Protections against differential analysis for elliptic curve cryptography
-
CHES2001, Springer-Verlag
-
M. Joye and C. Tymen, "Protections against differential analysis for elliptic curve cryptography," CHES2001, LNCS 2162, pp.377-390, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
21
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Math. Comput., vol.48, pp.203-209, 1987.
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
22
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Crypto'96, Springer-Verlag
-
C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," Crypto'96, LNCS 1109, pp. 104-113, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, C.1
-
23
-
-
84939573910
-
Differential power analysis
-
Crypto'99, Springer-Verlag
-
C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Crypto'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, C.1
Jaffe, J.2
Jun, B.3
-
25
-
-
84944898712
-
Preventing SPA/DPA in ECC systems using the Jacobi form
-
CHES2001, Springer-Verlag
-
P. Liardet and N. Smart, "Preventing SPA/DPA in ECC systems using the Jacobi form," CHES2001, LNCS 2162, pp.391-401, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 391-401
-
-
Liardet, P.1
Smart, N.2
-
26
-
-
85015402934
-
Use of elliptic curves in cryptography
-
CRYPTO'85, Springer-Verlag
-
V.S. Miller, "Use of elliptic curves in cryptography," CRYPTO'85, LNCS 218, pp.417-426, Springer-Verlag, 1986.
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
27
-
-
84947262754
-
Securing elliptic curve point multiplication against side-channel attacks
-
ISC 2001, Springer-Verlag, .Weiner
-
B. Möller, "Securing elliptic curve point multiplication against side-channel attacks," ISC 2001, LNCS 2200, pp.324-334, Springer-Verlag, 2001.Weiner
-
(2001)
LNCS
, vol.2200
, pp. 324-334
-
-
Möller, B.1
-
28
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods for factorizations
-
P. Montgomery, "Speeding the Pollard and elliptic curve methods for factorizations," Math. Comput., vol.48, pp.243-264, 1987.
-
(1987)
Math. Comput.
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
31
-
-
84957794840
-
Elliptic curves with the Montgomery form and their cryptographic applications
-
PKC2000, Springer-Verlag
-
K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic curves with the Montgomery form and their cryptographic applications," PKC2000, LNCS 1751, pp.446-465, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 446-465
-
-
Okeya, K.1
Kurumatani, H.2
Sakurai, K.3
-
32
-
-
84949949652
-
A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks
-
ICISC 2001, Springer-Verlag
-
K. Okeya, K. Miyazaki, and K. Sakurai, "A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks," ICISC 2001, LNCS 2288, pp.428-439, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2288
, pp. 428-439
-
-
Okeya, K.1
Miyazaki, K.2
Sakurai, K.3
-
33
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
-
Indocrypt 2000, Springer-Verlag
-
K. Okeya and K. Sakurai, "Power analysis breaks elliptic curve cryptosystems even secure against the timing attack," Indocrypt 2000, LNCS 1977, pp.178-190, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
34
-
-
85027140454
-
DPA-Gegenmaβnahmen bei einer ECDSA-Implementierung auf Chipkarten
-
presented at BSI, ECC Brainpool
-
M. Seysen, "DPA-Gegenmaβnahmen bei einer ECDSA-Implementierung auf Chipkarten," presented at DPA Workshop, BSI, ECC Brainpool, 2001.
-
(2001)
DPA Workshop
-
-
Seysen, M.1
-
35
-
-
84944876350
-
The Hessian form of an elliptic curve
-
CHES2001, Springer-Verlag
-
N. Smart, "The Hessian form of an elliptic curve," CHES2001, LNCS 2162, pp.118-125, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 118-125
-
-
Smart, N.1
|