-
1
-
-
84957693225
-
Chosen ciphertext attacks against protocols baaed on the RSA encryption standard PKCS #1
-
H. Krawczyk (Ed.): Crypto 1998, Springer
-
D. Bleichenbacher: Chosen Ciphertext Attacks Against Protocols Baaed on the RSA Encryption Standard PKCS #1. In: H. Krawczyk (Ed.): Crypto 1998, Springer, Lecture Notes in Computer Science 1462, 1998, 1-12.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
3
-
-
35248836120
-
Password interception in a SSL/TSL channel
-
D. Boneh (ed.): Crypto 2003, Springer, Heidelberg
-
B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux: Password Interception in a SSL/TSL Channel. In: D. Boneh (ed.): Crypto 2003, Lecture Notes in Computer Science 2729, Springer, Heidelberg (2003), 583-599.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
4
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith: Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. Cryptology 10 (no. 4) (1997) 233-260.
-
(1997)
J. Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
5
-
-
84954462346
-
A practical implementation of the timing attack
-
J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Berlin
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P.-A. Mestré, J.-J. Quisquater, J.-L. Willems: A Practical Implementation of the Timing Attack. In: J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Lecture Notes in Computer Science 1820, Berlin (2000), 175-191.
-
(2000)
Lecture Notes in Computer Science
, vol.1820
, pp. 175-191
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.-A.4
Quisquater, J.-J.5
Willems, J.-L.6
-
7
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS and other systems
-
N. Koblitz (ed.): Crypto 1996, Springer, Heidelberg
-
P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In: N. Koblitz (ed.): Crypto 1996, Springer, Lecture Notes in Computer Science 1100, Heidelberg (1996), 104-113.
-
(1996)
Lecture Notes in Computer Science
, vol.1100
, pp. 104-113
-
-
Kocher, P.1
-
10
-
-
68549092451
-
A timing attack against RSA with the chinese remainder theorem
-
Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Berlin
-
W. Schindler: A Timing Attack against RSA with the Chinese Remainder Theorem. In: Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Lecture Notes in Computer Science 1965, Berlin (2000), 110-125.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 110-125
-
-
Schindler, W.1
-
11
-
-
84946828535
-
Improving divide and conquer attacks against cryptosystems by better error detection / correction strategies
-
B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Berlin
-
W. Schindler, F. Koeune, J.-J. Quisquater: Improving Divide and Conquer Attacks Against Cryptosystems by Better Error Detection / Correction Strategies. In: B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Lecture Notes in Computer Science 2280, Berlin (2001), 245-267.
-
(2001)
Lecture Notes in Computer Science
, vol.2280
, pp. 245-267
-
-
Schindler, W.1
Koeune, F.2
Quisquater, J.-J.3
-
12
-
-
24144473659
-
On the optimization of side-channel attacks by advanced stochastic methods
-
, In: S. Vaudenay (ed.): Public Key Cryptography - PKC 2005, Springer, Berlin
-
W. Schindler: On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods, In: S. Vaudenay (ed.): Public Key Cryptography - PKC 2005, Springer, Lecture Notes in Computer Science 3386, Berlin 2005, 85-103.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 85-103
-
-
Schindler, W.1
-
13
-
-
33745773553
-
-
GNU Project: GMP: http://www.swox.com/gmp/.
-
-
-
-
14
-
-
33745791387
-
-
OpenSSL Project: OpenSSL: http://www.openssl.org.
-
-
-
|