-
2
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
D. Boneh, R.A. DeMillo, and R.J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," Proc. Conf. Advances in Cryptology - EUROCRYPT '97, vol. 1233, pp. 37-51, 1997.
-
(1997)
Proc. Conf. Advances in Cryptology - EUROCRYPT '97
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
3
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P.C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Proc. Conf. Advances in Cryptology - CRYPTO '96, vol. 1109, pp. 104-113, 1996.
-
(1996)
Proc. Conf. Advances in Cryptology - CRYPTO '96
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
4
-
-
84939573910
-
Differential power analysis
-
P.C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. Conf. Advances in Cryptology - CRYPTO '99, vol. 1666, pp. 388-397, 1999.
-
(1999)
Proc. Conf. Advances in Cryptology - CRYPTO '99
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
5
-
-
3042696081
-
Procédé Cryptographique Protégé Contre les Attaques de Type à Canal Caché
-
FR 28 38 210, Apr.
-
B. Chevallier-Mames and M. Joye, Procédé Cryptographique Protégé Contre les Attaques de Type à Canal Caché, Demande de Brevet Français, FR 28 38 210, Apr. 2002.
-
(2002)
Demande de Brevet Français
-
-
Chevallier-Mames, B.1
Joye, M.2
-
6
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
J.-S. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems," Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '99), vol. 1717, pp. 292-302, 1999.
-
(1999)
Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '99)
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
7
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1976.
-
(1976)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
8
-
-
0037068668
-
Recovering lost efficiency of exponentiation algorithms on smart cards
-
M. Joye, "Recovering Lost Efficiency of Exponentiation Algorithms on Smart Cards," Electronics Letters, vol. 38, no. 19, pp. 1095-1097, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.19
, pp. 1095-1097
-
-
Joye, M.1
-
10
-
-
0028499370
-
Fast square-and-multiply exponentiation for rSA
-
L.-C.-K. Hui and K.-Y. Lam, "Fast Square-and-Multiply Exponentiation for RSA," Electronics Letters, vol. 30, no. 17, pp. 1396-1397, 1994.
-
(1994)
Electronics Letters
, vol.30
, Issue.17
, pp. 1396-1397
-
-
Hui, L.-C.-K.1
Lam, K.-Y.2
-
11
-
-
0028768786
-
Efficiency of SS(l) square-and-multiple exponentiation algorithms
-
K.-Y. Lam and L.-C.-K. Hui, "Efficiency of SS(l) Square-and-Multiple Exponentiation Algorithms," Electronics Letters, vol. 30, no. 25, pp. 2115-2116, 1994.
-
(1994)
Electronics Letters
, vol.30
, Issue.25
, pp. 2115-2116
-
-
Lam, K.-Y.1
Hui, L.-C.-K.2
-
14
-
-
0000490812
-
A survey of fast exponentiation methods
-
D.M. Gordon, "A Survey of Fast Exponentiation Methods," J. Algorithms, vol. 27, pp. 129-146, 1998.
-
(1998)
J. Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.M.1
-
15
-
-
84947730530
-
On the performance of signature schemes based on elliptic curves
-
E. De Win, S. Mister, B. Preneel, and M. Wiener, "On the Performance of Signature Schemes Based on Elliptic Curves," Proc. Algorithmic Number Theory Symp., vol. 1423, pp. 252-266, 1998.
-
(1998)
Proc. Algorithmic Number Theory Symp.
, vol.1423
, pp. 252-266
-
-
De Win, E.1
Mister, S.2
Preneel, B.3
Wiener, M.4
-
16
-
-
84944901711
-
Protections against differential analysis for elliptic curve cryptography: An algebraic approach
-
M. Joye and C. Tymen, "Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach," Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES 2001), vol. 2162, pp. 377-390, 2001.
-
(2001)
Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES 2001)
, vol.2162
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
17
-
-
84944889837
-
MIST: An efficient randomized exponentiation algorithm for resisting power analysis
-
C.D. Walter, "MIST: An Efficient Randomized Exponentiation Algorithm for Resisting Power Analysis," Proc. Conf. Topics in Cryptology - CT-RSA 2002, vol. 2271, pp. 53-66, 2002.
-
(2002)
Proc. Conf. Topics in Cryptology - CT-RSA 2002
, vol.2271
, pp. 53-66
-
-
Walter, C.D.1
|