-
1
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
W. Fumy (Ed.): Advances in Cryptology-Eurocrypt'97. Springer-Verlag
-
Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In W. Fumy (Ed.): Advances in Cryptology-Eurocrypt'97. LNCS 1233, pp.37-51. Springer-Verlag (1997).
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
2
-
-
3042527150
-
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
-
IEEE Computer Society
-
Chevallier-Mames, B., Ciet, M., Joye, M.: Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. In IEEE Transactions on Computers, 53(6), pp.760-768. IEEE Computer Society (2004).
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 760-768
-
-
Chevallier-Mames, B.1
Ciet, M.2
Joye, M.3
-
3
-
-
84947916423
-
Finding a small root of a bivariate integer equation; factoring with high bits known
-
U. Maurer (Ed.): Advances in Cryptology-Eurocrypt'96. Springer-Verlag
-
Coppersmith, D.: Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known. In U. Maurer (Ed.): Advances in Cryptology-Eurocrypt'96. LNCS 1070, pp.178-189. Springer-Verlag (1996).
-
(1996)
LNCS
, vol.1070
, pp. 178-189
-
-
Coppersmith, D.1
-
4
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
Ç. Koç and C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'99. Springer-Verlag
-
Coron, J.-S.: Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems. In Ç. Koç and C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'99. LNCS 1717, pp.292-302. Springer-Verlag (1999).
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
5
-
-
84939573910
-
Differential power analysis
-
M. Wiener (Ed.): Advances in Cryptology^Crypto'99. Springer-Verlag
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In M. Wiener (Ed.): Advances in Cryptology^Crypto'99. LNCS 1666, pp.388-397. Springer-Verlag (1999).
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
6
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
N. Koblitz (Ed.): Advances in Cryptology-Crypto'96. Springer-Verlag
-
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In N. Koblitz (Ed.): Advances in Cryptology-Crypto'96. LNCS 1109, pp.104-113. Springer-Verlag (1996).
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
7
-
-
84947262754
-
Securing elliptic curve point multiplication against side-channel attacks
-
G. Davida, Y. Frankel (Eds.): Information Security-ISC'01. Springer-Verlag
-
Möller, B.: Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. In G. Davida, Y. Frankel (Eds.): Information Security-ISC'01. LNCS 2200, pp.324-334. Springer-Verlag (2001).
-
(2001)
LNCS
, vol.2200
, pp. 324-334
-
-
Möller, B.1
-
8
-
-
35248820671
-
Improved techniques for fast exponentiation
-
P.J. Lee, C.H. Lim (Eds.): Information Security and Cryptology-ICISC'02. Springer-Verlag
-
Möller, B.: Improved Techniques for Fast Exponentiation. In P.J. Lee, C.H. Lim (Eds.): Information Security and Cryptology-ICISC'02. LNCS 2587, pp.298-312. Springer-Verlag (2003).
-
(2003)
LNCS
, vol.2587
, pp. 298-312
-
-
Möller, B.1
-
9
-
-
35248865717
-
The width-w NAF method provides small memory and fast; elliptic scalar multiplications secure against side channel attacks
-
M. Joye (Ed.): Topics in Cryptology-CT-RSA'03. Springer-Verlag
-
Okeya, K., Takagi, T.: The Width-w NAF Method Provides Small Memory and Fast; Elliptic Scalar Multiplications Secure against Side Channel Attacks. In M. Joye (Ed.): Topics in Cryptology-CT-RSA'03. LNCS 2612, pp.328-342. Springer-Verlag (2003).
-
(2003)
LNCS
, vol.2612
, pp. 328-342
-
-
Okeya, K.1
Takagi, T.2
-
10
-
-
35248826949
-
A more flexible countermeasure against side channel attacks using window method
-
C. Walter, Ç. Koç, C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'03. Springer-Verlag
-
Okeya, K., Takagi, T.: A More Flexible Countermeasure against Side Channel Attacks Using Window Method. In C. Walter, Ç. Koç, C. Paar (Eds.): Cryptographic Hardware and Embedded Systems-CHES'03. LNCS 2779, pp.397-410. Springer-Verlag (2003).
-
(2003)
LNCS
, vol.2779
, pp. 397-410
-
-
Okeya, K.1
Takagi, T.2
-
11
-
-
33745587326
-
On the exact flexibility of the flexible countermeasure against side channel attacks
-
H. Wang, J. Pieprzyk, V. Varadharajan (Eds): Information Security and Privacy-ACISP'04. Springer-Verlag
-
Okeya, K., Takagi, T., Vuillaume, C.: On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. In H. Wang, J. Pieprzyk, V. Varadharajan (Eds): Information Security and Privacy-ACISP'04. LNCS 3108, pp.466-477. Springer-Verlag (2004).
-
(2004)
LNCS
, vol.3108
, pp. 466-477
-
-
Okeya, K.1
Takagi, T.2
Vuillaume, C.3
-
13
-
-
34047117968
-
Cache missing for fun and profit
-
Percival, C.: Cache Missing for Fun and Profit. Technical report, available at www.daemonology.net/papers/htt.pdf
-
Technical Report
-
-
Percival, C.1
-
15
-
-
84944889837
-
MIST, an efficient, randomized exponentiation algorithm for resisting power analysis
-
B. Preenel (Ed.): Topics in Cryptology - CT-RSA'02. Springer-Verlag
-
Walter, C.: MIST, an Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. In B. Preenel (Ed.): Topics in Cryptology - CT-RSA'02. LNCS 2271, pp.53-66. Springer-Verlag (2002).
-
(2002)
LNCS
, vol.2271
, pp. 53-66
-
-
Walter, C.1
-
16
-
-
24944495384
-
Improvement on ha-moon randomized exponentiation algorithm
-
C. Park, S. Ghee (Eds.): Information Security and Cryptology-ICISC'04. Springer-Verlag
-
Yen, S.-M., Chen, C.-N., Moon, S.-J. , Ha, J.: Improvement on Ha-Moon Randomized Exponentiation Algorithm. In C. Park, S. Ghee (Eds.): Information Security and Cryptology-ICISC'04. LNCS 3506, pp.154-167. Springer-Verlag (2005).
-
(2005)
LNCS
, vol.3506
, pp. 154-167
-
-
Yen, S.-M.1
Chen, C.-N.2
Moon, S.-J.3
Ha, J.4
-
17
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
IEEE Computer Society
-
Yen, S.-M., Joye, M.: Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. In IEEE Transactions on Computers, 49(9), pp.967-970. IEEE Computer Society (2000).
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.-M.1
Joye, M.2
|