-
1
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
LNCS, Springer-Verlag, Berlin
-
Cohen H, Miyaji A, Ono T (1998) Efficient elliptic curve exponentiation using mixed coordinates. In: Advances in Cryptology-ASIACRYPT '98. vol 1514. LNCS, Springer-Verlag, Berlin, pp 51-65
-
(1998)
Advances in Cryptology-ASIACRYPT '98
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
2
-
-
24944539815
-
Analysis of DPA countermeasures based on randomizing the binary algorithm
-
University of Waterloo
-
Ebeid N, Hasan MA (2003) Analysis of DPA countermeasures based on randomizing the binary algorithm. CACR Technical Reports CORR 2003-14, University of Waterloo
-
(2003)
CACR Technical Reports
, vol.CORR 2003-14
-
-
Ebeid, N.1
Ma, H.2
-
3
-
-
35048836123
-
On randomizing private keys to counteract DPA attacks
-
LNCS, Springer-Verlag, Berlin
-
Ebeid N, Hasan MA (2003) On randomizing private keys to counteract DPA attacks. In: Selected Areas in Cryptography-SAC '03. vol 3006. LNCS, Springer-Verlag, Berlin, pp 58-72
-
(2003)
Selected Areas in Cryptography-SAC '03
, vol.3006
, pp. 58-72
-
-
Ebeid, N.1
Ma, H.2
-
4
-
-
35048852643
-
Defeating countermeasures based on randomized BSD representations
-
LNCS, Springer-Verlag, Berlin
-
Fouque PA, Muller F, Poupard G, Valette F (2004) Defeating countermeasures based on randomized BSD representations. In: Cryptographic Hardware and Embedded Systems-CHES '04. vol 3156 LNCS, Springer-Verlag, Berlin, pp 312-327
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES '04
, vol.3156
, pp. 312-327
-
-
Fouque, P.A.1
Muller, F.2
Poupard, G.3
Valette, F.4
-
5
-
-
35248877672
-
Randomized signed-scalar multiplication of ECC to resist power attacks
-
LNCS, Springer-Verlag, Berlin
-
Ha J, Moon S (2002) Randomized signed-scalar multiplication of ECC to resist power attacks. In: Cryptographic Hardware and Embedded Systems-CHES '02. vol 2523 LNCS, Springer-Verlag, Berlin, pp 551-563
-
(2002)
Cryptographic Hardware and Embedded Systems-CHES '02
, vol.2523
, pp. 551-563
-
-
Ha, J.1
Moon, S.2
-
9
-
-
84944889933
-
Randomized addition-subtraction chains as a countermeasure against power attacks
-
LNCS, Springer-Verlag, Berlin
-
Oswald E, Aigner M (2001) Randomized addition-subtraction chains as a countermeasure against power attacks. In: Cryptographic Hardware and Embedded Systems-CHES '01. vol 2162 LNCS, Springer-Verlag, Berlin, pp 39-50
-
(2001)
Cryptographic Hardware and Embedded Systems-CHES '01
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
10
-
-
77957223221
-
Binary arithmetic
-
Reitwiesner GW (1960) Binary arithmetic. Adv Comput 1:231-308
-
(1960)
Adv Comput
, vol.1
, pp. 231-308
-
-
Reitwiesner, G.W.1
-
11
-
-
33646761064
-
New power analysis on the Ha-Moon algorithm and the MIST algorithm
-
LNCS, Springer-Verlag, Berlin
-
Sim SG, Park DJ, Lee PJ (2004) New power analysis on the Ha-Moon algorithm and the MIST algorithm. In: Information and communications security-ICICS '04. vol 3269 LNCS, Springer-Verlag, Berlin, pp 291-304
-
(2004)
Information and Communications Security-ICICS '04
, vol.3269
, pp. 291-304
-
-
Sim, S.G.1
Park, D.J.2
Lee, P.J.3
-
12
-
-
0010029876
-
Efficient arithmetic on Koblitz curves
-
Solinas JA (2000) Efficient arithmetic on Koblitz curves. Designs, Codes Cryptogr 19:195-249
-
(2000)
Designs, Codes Cryptogr
, vol.19
, pp. 195-249
-
-
Solinas, J.A.1
|