-
1
-
-
84958656559
-
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DSS Case
-
Springer-Verlag LKNCS 1233
-
M. Bellare and S. Goldwasser and D. Micciancio. "Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DSS Case. In Advances in Cryptology - EUROCRYPT '97, Springer-Verlag LKNCS 1233, 277-291, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
, pp. 277-291
-
-
Bellare, M.1
Goldwasser, S.2
Micciancio, D.3
-
5
-
-
35248898400
-
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA
-
Springer-Verlag LNCS
-
K. Itoh, T. Izu and M. Takenaka. Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. In Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 2523, 129-143, 2002.
-
(2002)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, vol.2523
, pp. 129-143
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
6
-
-
35248873415
-
A Practical Countermeasure Against Address-Bit Differential Power Analysis
-
Springer-Verlag LNCS
-
K. Itoh, T. Izu and M. Takenaka, A Practical Countermeasure Against Address-Bit Differential Power Analysis. In Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 2779, 382-396, 2003.
-
(2003)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, vol.2779
, pp. 382-396
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
7
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Springer-Verlag LNCS
-
P.C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO '96, Springer-Verlag LNCS 1109, 104-113, 1996.
-
(1996)
Advances in Cryptology - CRYPTO '96
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
9
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A.K. Lenstra, H.W. Lenstra and L. Lovász. Factoring polynomials with rational coefficients. Math. Ann., 261, 515-534, 1982.
-
(1982)
Math. Ann.
, vol.261
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
10
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Springer-Verlag LNCS
-
T.S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 1965, 238-251, 2000.
-
(2000)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
11
-
-
84945249400
-
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
-
Springer-Verlag LNCS
-
B. Möller. Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. In Information Security (ISC), Springer-Verlag LNCS 2433, 402-413, 2002.
-
(2002)
Information Security (ISC)
, vol.2433
, pp. 402-413
-
-
Möller, B.1
-
12
-
-
33746391879
-
The insecurity of the Digital Signature Algorithm with partially known nonces
-
P.Q. Nguyen and I.E. Shparlinski. The insecurity of the Digital Signature Algorithm with partially known nonces. J. Cryptology, 15, 151-176, 2002.
-
(2002)
J. Cryptology
, vol.15
, pp. 151-176
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
13
-
-
0141889703
-
On the insecurity of the elliptic curve digital signature algorithm with partially known nonces
-
To appear.
-
P.Q. Nguyen and I.E. Shparlinski. On the insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, Codes and Cryptography, To appear.
-
Designs, Codes and Cryptography
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
15
-
-
85029774337
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
Springer-Verlag LNCS
-
C.P. Schnorr and M. Euchner. Lattice basis reduction: improved practical algorithms and solving subset sum problems. In Proc. FCT 1991, Springer-Verlag LNCS 529, 68-85, 1991.
-
(1991)
Proc. FCT 1991
, vol.529
, pp. 68-85
-
-
Schnorr, C.P.1
Euchner, M.2
-
17
-
-
35248855964
-
Cryptanalysis of des Implemented on Computers with Cache
-
Springer-Verlag LNCS
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri and H. Miyauchi. Cryptanalysis of DES Implemented on Computers with Cache. In Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 2779, 62-76, 2003.
-
(2003)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, vol.2779
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
18
-
-
84937560280
-
Distinguishing Exponent Digits by Observing Modular Subtractions
-
Springer-Verlag LNCS
-
C.D. Walter and S. Thompson. Distinguishing Exponent Digits by Observing Modular Subtractions. In Topics in Cryptology (CT-RSA), Springer-Verlag LNCS 2020, 192-207, 2001.
-
(2001)
Topics in Cryptology (CT-RSA)
, vol.2020
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
-
19
-
-
0000955648
-
Solving exponential diophantine equations using lattice basis reduction
-
B.M.M. de Weger. Solving exponential diophantine equations using lattice basis reduction. J. Number Theory, 26, 325-367, 1987.
-
(1987)
J. Number Theory
, vol.26
, pp. 325-367
-
-
De Weger, B.M.M.1
|