-
1
-
-
15944367466
-
Primes is in P
-
M. Agrawal, N. Kayal, and N. Saxena. Primes is in P. Ann. of Math., 160(2):781-793, 2004.
-
(2004)
Ann. of Math.
, vol.160
, Issue.2
, pp. 781-793
-
-
Agrawal, M.1
Kayal, N.2
Saxena, N.3
-
4
-
-
11244348664
-
Fault attacks on RSA: Concrete results and practical countermeasures
-
Springer
-
C. Aumueller, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert. Fault attacks on RSA: Concrete results and practical countermeasures. In Proc. of CHES 2002, LNCS, pages 261-276. Springer, 2002.
-
(2002)
Proc. of CHES 2002, LNCS
, pp. 261-276
-
-
Aumueller, C.1
Bier, P.2
Fischer, W.3
Hofreiter, P.4
Seifert, J.-P.5
-
6
-
-
33745777234
-
-
ePrint archive of IACR 2004/100, IACR
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The sorcerer's apprentice guide to fault attacks. ePrint archive of IACR 2004/100, IACR, 2004.
-
(2004)
The Sorcerer's Apprentice Guide to Fault Attacks.
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
7
-
-
33744529805
-
Cache-timing attacks on AES
-
D. J. Bernstein. Cache-timing attacks on AES. Technical report, http://cr.yp.to, http://cr.yp.to/papers.html#cachetiming, 2005.
-
(2005)
Technical Report
-
-
Bernstein, D.J.1
-
8
-
-
14844326209
-
A new CRT-RSA algorithm secure against Bellcore attacks
-
ACM, ACM Press
-
J. Bloemer, M. Otto, and J.-P. Seifert. A new CRT-RSA algorithm secure against Bellcore attacks. In Proc. of 10th ACM Conference on Computer and Communications Security, pages 311-320. ACM, ACM Press, 2003.
-
(2003)
Proc. of 10th ACM Conference on Computer and Communications Security
, pp. 311-320
-
-
Bloemer, J.1
Otto, M.2
Seifert, J.-P.3
-
10
-
-
3042641393
-
On the importance of eliminating errors in cryptographic computations
-
D. Boneh, R. A. DeMillo, and R. Lipton. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology, 14(2):101-120, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.2
, pp. 101-120
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.3
-
11
-
-
33745788433
-
On generation of probable primes by incremental search
-
In Proc. of CRYPTO '92, Springer
-
J. Brandt and I. Damgard. On generation of probable primes by incremental search. In Proc. of CRYPTO '92, volume 740 of LNCS, pages 358-370. Springer, 1993.
-
(1993)
LNCS
, vol.740
, pp. 358-370
-
-
Brandt, J.1
Damgard, I.2
-
13
-
-
24044554454
-
Statistics and secret leakage
-
J.-S. Coron, D. Naccache, and P. Kocher. Statistics and secret leakage. ACM Transactions on Embedded Computing Systems, 3(3):492-508, 2004.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 492-508
-
-
Coron, J.-S.1
Naccache, D.2
Kocher, P.3
-
14
-
-
0042349623
-
A trusted open platform
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A trusted open platform. IEEE Computer, 36(7):55-62, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
15
-
-
84947424562
-
Authenticated operation of open computing devices
-
In Proc. of ACISP '08, Springer
-
P. England and M. Peinado. Authenticated operation of open computing devices. In Proc. of ACISP '08, volume 2384 of LNCS, pages 346-261. Springer, 2002.
-
(2002)
LNCS
, vol.2384
, pp. 346-1261
-
-
England, P.1
Peinado, M.2
-
16
-
-
33745792431
-
-
TCG. Trusted computing group. http://www.trustedcomputinggroup.org.
-
-
-
-
17
-
-
27544440859
-
-
No Starch Press, Inc., San Francisco
-
A. "Bunnie" Huang. Hacking the Xbox. No Starch Press, Inc., San Francisco, 2003.
-
(2003)
Hacking the Xbox
-
-
Huang, A.1
-
18
-
-
84943632039
-
Timing attacks on implementations of DH, RSA, DSS and other systems
-
Springer
-
P. C. Kocher. Timing attacks on implementations of DH, RSA, DSS and other systems. In Proc. of CRYPTO '96, LNCS, pages 104-113. Springer, 1996.
-
(1996)
Proc. of CRYPTO '96, LNCS
, pp. 104-113
-
-
Kocher, P.C.1
-
23
-
-
0002368017
-
On the normal density of primes in small intervals and the difference between consecutive primes
-
A. Selberg. On the normal density of primes in small intervals and the difference between consecutive primes. Arch. Math. Naturvid., 47:87-105, 1943.
-
(1943)
Arch. Math. Naturvid.
, vol.47
, pp. 87-105
-
-
Selberg, A.1
-
27
-
-
35248855964
-
Cryptanalysis of des implemented on computers with cache
-
Springer
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi. Cryptanalysis of DES implemented on computers with cache. In Proc. of CHES 2003, LNCS, pages 62-76. Springer, 2003.
-
(2003)
Proc. of CHES 2003, LNCS
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
|