-
1
-
-
0017930809
-
A method for Obtaining Digital Signatures and Public-key Cryptosystem
-
February
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for Obtaining Digital Signatures and Public-key Cryptosystem," Communications of ACM, vol. 21, no. 2, pp. 120-126, February 1978.
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0017018484
-
New directions in cryptography
-
Online, Available
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976. [Online]. Available: citeseer.ist.psu.edu/diffie76new.html
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
4
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
January
-
N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203 209, January 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
5
-
-
4243378405
-
An overview of elliptic curve cryptography
-
Technical Report, Online, Available
-
J. Lopez and R. Dahab, "An overview of elliptic curve cryptography," Technical Report, 2000. [Online]. Available: citeseer.ist.psu.edu/lop00overview.html
-
(2000)
-
-
Lopez, J.1
Dahab, R.2
-
6
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Proceedings of the 16th Annual International Cryptology Conference CRYPTO, Santa Barbara, CA, Aug
-
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," in Proceedings of the 16th Annual International Cryptology Conference (CRYPTO), ser. Lecture Notes in Computer Science, vol. 1109, Santa Barbara, CA, Aug. 1996, pp. 104-113.
-
(1996)
ser. Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
7
-
-
84939573910
-
Differential power analysis
-
Online, Available
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Lecture Notes in Computer Science, vol. 1666, pp. 388-397, 1999. [Online]. Available: citeseer.ist.psu.edu/kocher99.differential.html
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
8
-
-
84858083651
-
-
Online, Available
-
Acoustic Cryptanalysis. [Online]. Available: http://www.wisdom.weizmann. ac.il/~tromier/acoustic/
-
Acoustic Cryptanalysis
-
-
-
9
-
-
84958979095
-
Weierstraß Elliptic Curves and Side-Channel Attacks
-
Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC, Paris, France, Feb
-
E. Brier and M. Joye, "Weierstraß Elliptic Curves and Side-Channel Attacks," in Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, ser. Lecture Notes in Computer Science, vol. 2274, Paris, France, Feb. 2002, pp. 335-345.
-
(2002)
ser. Lecture Notes in Computer Science
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
10
-
-
84968484435
-
Speeding the Pollard and Elliptic Curve Methods of Factorization
-
January
-
P. L. Montgomery, "Speeding the Pollard and Elliptic Curve Methods of Factorization," Mathematics of Computation, vol. 48, no. 177, pp. 243-264, January 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
11
-
-
84958670390
-
Efficient Algorithms for Elliptic Curve Cryptosystems
-
97, pp
-
J. Guajardo and C. Paar, "Efficient Algorithms for Elliptic Curve Cryptosystems," The 17th Annual International Cryptology Conference, CRYPTO '97, pp. 342-356, 1997.
-
(1997)
The 17th Annual International Cryptology Conference, CRYPTO
, pp. 342-356
-
-
Guajardo, J.1
Paar, C.2
-
13
-
-
34547378052
-
-
M. Ciet, M. Joye, K. Lauter, and P. L. Montgomery, Trading Inversions for Multiplications in Elliptic Curve Cryptography, 2003. [Online]. Available: eprint.iacr.org/2003/257/
-
M. Ciet, M. Joye, K. Lauter, and P. L. Montgomery, "Trading Inversions for Multiplications in Elliptic Curve Cryptography," 2003. [Online]. Available: eprint.iacr.org/2003/257/
-
-
-
-
14
-
-
25544451391
-
An Efficient Procedure to Double and Add Points on an Elliptic Curve
-
Online, Available: research.microsoft.com/crypto
-
K. Eisentrager, K. Lauter, and P. L. Montgomery, "An Efficient Procedure to Double and Add Points on an Elliptic Curve," 2002. [Online]. Available: research.microsoft.com/crypto/
-
(2002)
-
-
Eisentrager, K.1
Lauter, K.2
Montgomery, P.L.3
-
16
-
-
13244286640
-
A hardware algorithm for modular multiplication/division
-
M. E. Kaihara and N. Takagi, "A hardware algorithm for modular multiplication/division," IEEE Transactions on Computers, vol. 54, no. 1, pp. 12-21, 2005.
-
(2005)
IEEE Transactions on Computers
, vol.54
, Issue.1
, pp. 12-21
-
-
Kaihara, M.E.1
Takagi, N.2
|