-
1
-
-
84939573910
-
Differential power analysis
-
LNCS 1666, Springer-Verlag
-
P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," Advances in Cryptology - CRYPTO '99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Commun. of ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
85015402934
-
Uses of elliptic curve in cryptography
-
LNCS 218, Springer-Verlag
-
V. Miller, "Uses of elliptic curve in cryptography," Advances in Cryptology -CRYPTO '85, LNCS 218, pp. 417-426, Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology -CRYPTO '85
, pp. 417-426
-
-
Miller, V.1
-
4
-
-
84968503742
-
Elliptic curve cryptosystems
-
Jan.
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, Jan. 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
5
-
-
35248816371
-
A refined power-analysis attack on elliptic curve cryptosystems
-
LNCS 2567, Springer-Verlag
-
L. Goubin, "A refined power-analysis attack on elliptic curve cryptosystems," Proc. of Public Key Cryptography - PKC '03, LNCS 2567, pp. 199-210, Springer-Verlag, 2003.
-
(2003)
Proc. of Public Key Cryptography - PKC '03
, pp. 199-210
-
-
Goubin, L.1
-
6
-
-
35248871165
-
Zero-value point attacks on elliptic curve cryptosystem
-
LNCS 2851, Springer-Verlag
-
T. Akishita and T. Takagi, "Zero-value point attacks on elliptic curve cryptosystem," Proc. of Information Security Conference - ISC '03, LNCS 2851, pp. 218-233, Springer-Verlag, 2003.
-
(2003)
Proc. of Information Security Conference - ISC '03
, pp. 218-233
-
-
Akishita, T.1
Takagi, T.2
-
7
-
-
35248881073
-
The doubling attack - Why upwards is better than downwards
-
LNCS 2779, Springer-Verlag
-
P.-A. Fouque and F. Valette, "The doubling attack - why upwards is better than downwards," Proc. of Cryptographic Hardware and Embedded Systems - CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003.
-
(2003)
Proc. of Cryptographic Hardware and Embedded Systems - CHES '03
, pp. 269-280
-
-
Fouque, P.-A.1
Valette, F.2
-
8
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
LNCS 1717, Springer-Verlag
-
J. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," Proc. of Cryptographic Hardware and Embedded Systems - CHES '99, LNCS 1717, pp. 292-302, Springer-Verlag, 1999.
-
(1999)
Proc. of Cryptographic Hardware and Embedded Systems - CHES '99
, pp. 292-302
-
-
Coron, J.1
-
9
-
-
35048860937
-
Efficient countermeasures against RPA, DPA, and SPA
-
LNCS 3156, Springer-Verlag
-
H. Mamiya, A. Miyaji, and H. Morimoto, "Efficient countermeasures against RPA, DPA, and SPA," Proc. of Cryptographic Hardware and Embedded Systems CHES '04, LNCS 3156, pp. 343-356, Springer-Verlag, 2004.
-
(2004)
Proc. of Cryptographic Hardware and Embedded Systems CHES '04
, pp. 343-356
-
-
Mamiya, H.1
Miyaji, A.2
Morimoto, H.3
-
10
-
-
33646189593
-
RSA cryptography standard
-
5 January
-
PKCS #1 v2.1, "RSA Cryptography Standard", 5 January 2001. http://www.rsasecurity.com/rsalabs/pkcs/
-
(2001)
PKCS #1 V2.1
-
-
-
11
-
-
84948986458
-
Optimal asymmetric encryption padding- How to encrypt with RSA
-
LNCS 950, Springer-Verlag
-
M. Bellare and P. Rogaway, "Optimal asymmetric encryption padding- How to encrypt with RSA," Advances in Cryptology - EUROCRYPT '94, LNCS 950, pp. 92-111, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT '94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
12
-
-
0242571732
-
A new class of collision attacks and its application to des
-
LNCS 2887, Springer-Verlag
-
K. Schramm, T. Wollinger, and G. Paar, "A new class of collision attacks and its application to DES," Proc. of Fast Software Encryption - FSE '03, LNCS 2887, pp. 206-222, Springer-Verlag, 2003.
-
(2003)
Proc. of Fast Software Encryption - FSE '03
, pp. 206-222
-
-
Schramm, K.1
Wollinger, T.2
Paar, G.3
-
13
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
15
-
-
0020194569
-
Fast decipherment algorithm for RSA public key cryptosystem
-
J.-J. Quisquater and C. Couvreur, "Fast decipherment algorithm for RSA public key cryptosystem," Electronics Letters, vol. 18, no. 21, pp. 905-907, 1982.
-
(1982)
Electronics Letters
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
|