-
2
-
-
33745777234
-
"The Sorcerer's Apprentice Guide to Fault Attacks"
-
Report 2004/10
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, "The Sorcerer's Apprentice Guide to Fault Attacks," Cryptology ePrint Archive, Report 2004/10, 2004.
-
(2004)
Cryptology EPrint Archive
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
3
-
-
27244454939
-
"Efficient Pairing Computation on Supersingular Abelian Varieties"
-
Report 2004/375
-
P.S.L.M. Barreto, S. Galbraith, C. O'hEigeartaigh, and M. Scott, "Efficient Pairing Computation on Supersingular Abelian Varieties," Cryptology ePrint Archive, Report 2004/375, 2004.
-
(2004)
Cryptology EPrint Archive
-
-
Barreto, P.S.L.M.1
Galbraith, S.2
O'hEigeartaigh, C.3
Scott, M.4
-
4
-
-
84937428623
-
"Efficient Algorithms for Pairing-Based Cryptosystems"
-
P.S.L.M. Barreto, H. Kim, B. Lynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Advances in Cryptology, Proc. CRYPTO, pp. 354-368, 2002.
-
(2002)
Advances in Cryptology, Proc. CRYPTO
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
5
-
-
0037623983
-
"Identity-Based Encryption from the Weil Pairing"
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
33645604900
-
"Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults"
-
M. Ciet and M. Joye, "Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults," Designs, Codes, and Cryptography, 2004.
-
(2004)
Designs, Codes, and Cryptography
-
-
Ciet, M.1
Joye, M.2
-
8
-
-
27244436098
-
"Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields"
-
Report 2004/303
-
S. Kwon, "Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields," Cryptology ePrint Archive, Report 2004/303, 2004.
-
(2004)
Cryptology EPrint Archive
-
-
Kwon, S.1
-
9
-
-
27244454348
-
"Pairing-Based Cryptographic Protocols: A Survey"
-
Report 2004/064
-
R. Dutta, R. Barua, and P. Sarkar, "Pairing-Based Cryptographic Protocols: A Survey," Cryptology ePrint Archive, Report 2004/064, 2004.
-
(2004)
Cryptology EPrint Archive
-
-
Dutta, R.1
Barua, R.2
Sarkar, P.3
-
10
-
-
82955246861
-
"Implementing the Tate Pairing"
-
S. Galbraith, K. Harrison, and D. Soldera, "Implementing the Tate Pairing," Proc. Algorithmic Number Theory Symposium (ANTS-V), pp. 324-337, 2002.
-
(2002)
Proc. Algorithmic Number Theory Symposium (ANTS-V)
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
11
-
-
23044504671
-
"On Small Characteristic Algebraic Tori in Pairing-Based Cryptography"
-
Report 2004/132
-
R. Granger, D. Page, and M. Stam, "On Small Characteristic Algebraic Tori in Pairing-Based Cryptography," Cryptology ePrint Archive, Report 2004/132, 2004.
-
(2004)
Cryptology EPrint Archive
-
-
Granger, R.1
Page, D.2
Stam, M.3
-
12
-
-
84943632039
-
"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems"
-
P.C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology, Proc. CRYPTO, pp. 104-113, 1996.
-
(1996)
Advances in Cryptology, Proc. CRYPTO
, pp. 104-113
-
-
Kocher, P.C.1
-
13
-
-
84939573910
-
"Differential Power Analysis"
-
P.C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Advances in Cryptology, Proc. CRYPTO, pp. 388-397, 1999.
-
(1999)
Advances in Cryptology, Proc. CRYPTO
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
15
-
-
0035336179
-
"New Explicit Conditions on Elliptic Curve Traces for FR-Reduction"
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New Explicit Conditions on Elliptic Curve Traces for FR-Reduction," IEICE Trans. Fundamentals, vol. E-84 A(5), pp. 1234-1243, 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E-84A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
|