-
1
-
-
33745789300
-
Hardware implementation of elliptic curve cryptosystems for contactless IC card
-
in Japanese
-
T. Akishita, K. Iizuka, and H. Sato, "Hardware Implementation of Elliptic Curve Cryptosystems for Contactless IC Card", Proceedings of SCIS 2002, 15B-1, pp.1107-1112, 2002 (in Japanese).
-
(2002)
Proceedings of SCIS 2002
, vol.15 B-1
, pp. 1107-1112
-
-
Akishita, T.1
Iizuka, K.2
Sato, H.3
-
2
-
-
35248871165
-
Zero-value point attack on elliptic curve cryptosystems
-
Information Security - ISC 2003, Springer-Verlag
-
T. Akishita and T. Takagi, "Zero-Value Point Attack on Elliptic Curve Cryptosystems", Information Security - ISC 2003, LNCS 2851, pp.218-233, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2851
, pp. 218-233
-
-
Akishita, T.1
Takagi, T.2
-
4
-
-
84958979095
-
Weierstraas elliptic curve and side-channel attacks
-
Public Key Cryptography - PKC 2002, Springer-Verlag
-
E. Brier and M. Joye, "Weierstraas Elliptic Curve and Side-Channel Attacks", Public Key Cryptography - PKC 2002, LNCS 2274, pp.335-345, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
5
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
Cryptographic Hardware and Embedded Systems - CHES '99, Springer-Verlag
-
J.-S. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems", Cryptographic Hardware and Embedded Systems - CHES '99, LNCS 1717, pp.292-302, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
6
-
-
35248816371
-
A refined power-analysis attack on elliptic curve cryptosystems
-
Public Key Cryptography - PKC 2003, Springer-Verlag
-
L. Goubin, "A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems", Public Key Cryptography - PKC 2003, LNCS 2567, pp.199-211, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 199-211
-
-
Goubin, L.1
-
7
-
-
84902477345
-
Efficient countermeasures against power analysis for elliptic curve cryptosystems
-
Kluwer
-
K. Itoh, T. Izu, and T. Takenaka, "Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems", Sixth Smart Card Research an Advanced Application IFIP Conference - CARDIS 2004, pp.99-114, Kluwer, 2004.
-
(2004)
Sixth Smart Card Research an Advanced Application IFIP Conference - CARDIS 2004
, pp. 99-114
-
-
Itoh, K.1
Izu, T.2
Takenaka, T.3
-
8
-
-
23944497026
-
Exceptional procedure attack on elliptic curve cryptosystems
-
Public Key Cryptography - PKC 2003, Springer-Verlag
-
T. Izu and T. Takagi, "Exceptional Procedure Attack on Elliptic Curve Cryptosystems", Public Key Cryptography - PKC 2003, LNCS 2567, pp.224-239, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 224-239
-
-
Izu, T.1
Takagi, T.2
-
9
-
-
84944901711
-
Protection against differential analysis for elliptic curve cryptography
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
M. Joye and C. Tymen, "Protection against Differential Analysis for Elliptic Curve Cryptography", Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp.377-390, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
10
-
-
84944884283
-
Hessian elliptic curves and side-channel attacks
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
M. Joye and J.-J. Quisquater, "Hessian Elliptic Curves and Side-Channel Attacks", Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp.402-410, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 402-410
-
-
Joye, M.1
Quisquater, J.-J.2
-
11
-
-
84939573910
-
Differential power analysis
-
Advances in Cryptology - CRYPTO '99, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", Advances in Cryptology - CRYPTO '99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
84944898712
-
Preventing SPA/DPA in ECC systems using the jacobi form
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
P.-Y. Liardet and N.P. Smart, "Preventing SPA/DPA in ECC Systems Using the Jacobi Form", Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, pp.391-401, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 391-401
-
-
Liardet, P.-Y.1
Smart, N.P.2
-
13
-
-
84949514743
-
Power analysis attacks of modular exponentiation in smartcards
-
Cryptographic Hardware and Embedded Systems - CHES '99, Springer-Verlag
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", Cryptographic Hardware and Embedded Systems - CHES '99, LNCS 1717, pp.144-157, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
14
-
-
35048860937
-
Efficient countermeasure against RPA, DPA, and SPA
-
Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
-
H. Mamiya, A. Miyaji, and H. Morimoto, "Efficient Countermeasure against RPA, DPA, and SPA", Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, pp.343-356, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 343-356
-
-
Mamiya, H.1
Miyaji, A.2
Morimoto, H.3
-
15
-
-
84968484435
-
Speeding the pollard and elliptic curve methods of factorization
-
P.L. Montgomery, "Speeding the Pollard and Elliptic Curve Methods of Factorization", Mathematics of Computation, vol.48, pp.243-264, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 243-264
-
-
Montgomery, P.L.1
-
16
-
-
84957794840
-
Elliptic curves with the montgomery-form and their cryptographic applications
-
Public Key Cryptography - PKC 2000, Springer-Verlag
-
K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications", Public Key Cryptography - PKC 2000, LNCS 1751, pp.238-257, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 238-257
-
-
Okeya, K.1
Kurumatani, H.2
Sakurai, K.3
-
17
-
-
84949949652
-
A fast scalar multiplication method with randomized projective coordinate on a montgomery-form elliptic curve secure against side channel attacks
-
Information Security and Cryptology - ICISC 2001, Springer-Verlag
-
K. Okeya, K. Miyazaki, and K. Sakurai, "A Fast Scalar Multiplication Method with Randomized Projective Coordinate on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks", Information Security and Cryptology - ICISC 2001, LNCS 2288, pp.428-439, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2288
, pp. 428-439
-
-
Okeya, K.1
Miyazaki, K.2
Sakurai, K.3
-
18
-
-
35248821153
-
An analysis of goubin's refined power analysis attack
-
Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag
-
N.P. Smart, "An Analysis of Goubin's Refined Power Analysis Attack", Cryptographic Hardware and Embedded Systems - CHES 2003, LNCS 2779, pp.281-290, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2779
, pp. 281-290
-
-
Smart, N.P.1
-
19
-
-
27244431906
-
Random switching logic: A countermeasure against DPA based on transition probability
-
D. Suzuki, M. Saeki, and T. Ichikawa, "Random Switching Logic: A Countermeasure against DPA based on Transition Probability", IACR Cryptology ePrint Archive 2004/346, 2004. http://eprint.iacr.org/2004/346/
-
(2004)
IACR Cryptology ePrint Archive
, vol.2004
, Issue.346
-
-
Suzuki, D.1
Saeki, M.2
Ichikawa, T.3
-
20
-
-
27244445509
-
DPA leakage model for CMOS logic circuits
-
Cryptographic Hardware and Embedded Systems - CHES 2005, Springer-Verlag
-
D. Suzuki, M. Saeki, and T. Ichikawa, "DPA Leakage Model for CMOS Logic Circuits", Cryptographic Hardware and Embedded Systems - CHES 2005, LNCS 3659, pp.366-382, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3659
, pp. 366-382
-
-
Suzuki, D.1
Saeki, M.2
Ichikawa, T.3
-
21
-
-
35048841251
-
Simple power analysis of unified code for ECC double and add
-
Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
-
C.D. Walter, "Simple Power Analysis of Unified Code for ECC Double and Add", Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, pp.191-204, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 191-204
-
-
Walter, C.D.1
|