-
1
-
-
35048886727
-
-
Portable Data Carrier Including A Microprocessor, Patent no. 4211919 (Abstract), US Patent and Trademark Office, July 8, 1980
-
Portable data carrier including a microprocessor, Patent no. 4211919 (Abstract), US Patent and Trademark Office, July 8, 1980.
-
-
-
-
2
-
-
0003508562
-
-
FIPS PUB 186-2 (Appendix 6), U. S. National Institute of Standards and Technology, 27 Jan
-
Digital Signature Standard (DSS), FIPS PUB 186-2 (Appendix 6), U. S. National Institute of Standards and Technology, 27 Jan 2000.
-
(2000)
Digital Signature Standard (DSS)
-
-
-
3
-
-
84958979095
-
Weierstraß Elliptic Curves and Side-Channel Attacks
-
Public Key Cryptography (Proc. PKC 2002), D. Naccache & P. Paillier (editors), Springer-Verlag
-
E. Brier & M. Joye, Weierstraß Elliptic Curves and Side-Channel Attacks, Public Key Cryptography (Proc. PKC 2002), D. Naccache & P. Paillier (editors), LNCS 2274, Springer-Verlag, 2002, pp. 335-345.
-
(2002)
LNCS
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
4
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Cryptographic Hardware and Embedded Systems (Proc. CHES 99), G. Paar & Ç. Koç (editors), Springer-Verlag
-
J. -S. Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (Proc. CHES 99), G. Paar & Ç. Koç (editors), LNCS 1717, Springer-Verlag, 1999, pp. 292-302.
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.S.1
-
5
-
-
84954462346
-
A practical implementation of the Timing Attack
-
Proc. CARDIS 1998, J. -J. Quisquater & B. Schneier (editors), Springer-Verlag
-
J. -F. Dhem, F. Koeune, P. -A. Leroux, P. Mestré, J. -J. Quisquater & J. -L. Willems, A practical implementation of the Timing Attack, Proc. CARDIS 1998, J. -J. Quisquater & B. Schneier (editors), LNCS 1820, Springer-Verlag, 2000, pp. 175-190.
-
(2000)
LNCS
, vol.1820
, pp. 175-190
-
-
Dhem, J.F.1
Koeune, F.2
Leroux, P.A.3
Mestré, P.4
Quisquater, J.J.5
Willems, J.L.6
-
6
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
K. Gandolfi, C. Mourtel & F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 251-261.
-
(2001)
LNCS
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
7
-
-
35248815162
-
Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor
-
Cryptographic Hardware and Embedded Systems - CHES 2002, B. Kaliski, Ç. Koç & C. Paar (editors), Springer-Verlag
-
C. Gebotys & R. Gebotys, Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor, Cryptographic Hardware and Embedded Systems - CHES 2002, B. Kaliski, Ç. Koç & C. Paar (editors), LNCS 2523, Springer-Verlag, 2003, pp. 114-128.
-
(2003)
LNCS
, vol.2523
, pp. 114-128
-
-
Gebotys, C.1
Gebotys, R.2
-
8
-
-
84944884283
-
Hessian Elliptic Curves and Side. Channel Attacks
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
M. Joye &: J. -J. Quisquater, Hessian Elliptic Curves and Side. Channel Attacks, Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 402-410.
-
(2001)
LNCS
, vol.2162
, pp. 402-410
-
-
Joye, M.1
Quisquater, J.J.2
-
9
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
10
-
-
84943632039
-
Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Advances in Cryptology - CRYPTO '96, N. Koblitz (editor), Springer-Verlag
-
P. Kocher, Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology - CRYPTO '96, N. Koblitz (editor), LNCS 1109, Springer-Verlag, 1996, pp. 104-113.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
11
-
-
84939573910
-
Differential Power Analysis
-
Advances in Cryptology - CRYPTO '99, M. Wiener (editor), Springer-Verlag
-
P. Kocher, J. Jaffe & B. Jun, Differential Power Analysis, Advances in Cryptology - CRYPTO '99, M. Wiener (editor), LNCS 1666, Springer-Verlag, 1999, pp. 388-397.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
84944898712
-
Preventing SPA/DPA in ECC Systems using the Jacobi Form
-
Cryptographic Hardware and Embedded Systems - CUES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
P. -Y. Liardet & N. P. Smart, Preventing SPA/DPA in ECC Systems using the Jacobi Form, Cryptographic Hardware and Embedded Systems - CUES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 391-401.
-
(2001)
LNCS
, vol.2162
, pp. 391-401
-
-
Liardet, P.Y.1
Smart, N.P.2
-
13
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Advances in Cryptology -CRYPTO '85, H. C. Williams (editor), Springer-Verlag
-
V. Miller, Use of Elliptic Curves in Cryptography, Advances in Cryptology -CRYPTO '85, H. C. Williams (editor), LNCS 218, Springer-Verlag, 1986, pp. 417-426.
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
14
-
-
84966243285
-
Modular Multiplication without Trial Division
-
P. L. Montgomery, Modular Multiplication without Trial Division, Mathematics of Computation 44, no. 170, 1985, pp. 519-521.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
15
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
-
Smart Card Programming and Security (Proc. e-Smart 2001), I. Attali & T. Jensen (editors), Springer-Verlag
-
J. -J. Quisquater &: D. Samyde, ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards, Smart Card Programming and Security (Proc. e-Smart 2001), I. Attali & T. Jensen (editors), LNCS 2140, Springer-Verlag, 2001, pp. 200-210.
-
(2001)
LNCS
, vol.2140
, pp. 200-210
-
-
Quisquater, J.J.1
Samyde, D.2
-
16
-
-
84958960266
-
A Combined Timing and Power Attack
-
Public Key Cryptography (Proc. PKC 2002), P. Paillier & D. Naccache (editors), Springer-Verlag
-
W. Schindler, A Combined Timing and Power Attack, Public Key Cryptography (Proc. PKC 2002), P. Paillier & D. Naccache (editors), LNCS 2274, Springer-Verlag, 2002, pp. 263-279.
-
(2002)
LNCS
, vol.2274
, pp. 263-279
-
-
Schindler, W.1
-
17
-
-
33645591077
-
More detail for a Combined Timing and Power Attack against Implementations of RSA
-
Cryptography and Coding, K. G. Paterson (editor), Springer-Verlag
-
W. Schindler & C. D. Walter, More detail for a Combined Timing and Power Attack against Implementations of RSA, Cryptography and Coding, K. G. Paterson (editor), LNCS 2898, Springer-Verlag, 2003, pp. 245-263.
-
(2003)
LNCS
, vol.2898
, pp. 245-263
-
-
Schindler, W.1
Walter, C.D.2
-
18
-
-
84944900219
-
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli
-
Topics in Cryptology - CT-RSA 2002, B. Preneel (editor), Springer-Verlag
-
C. D. Walter, Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli, Topics in Cryptology - CT-RSA 2002, B. Preneel (editor), LNCS 2271, Springer-Verlag, 2002, pp. 30-39.
-
(2002)
LNCS
, vol.2271
, pp. 30-39
-
-
Walter, C.D.1
-
19
-
-
84937560280
-
Distinguishing Exponent Digits by Observing Modular Subtractions
-
Topics in Cryptology - CT-RSA 2001, D. Naccache (editor), Springer-Verlag
-
C. D. Walter & S. Thompson, Distinguishing Exponent Digits by Observing Modular Subtractions, Topics in Cryptology - CT-RSA 2001, D. Naccache (editor), LNCS 2020, Springer-Verlag, 2001, pp. 192-207.
-
(2001)
LNCS
, vol.2020
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
-
20
-
-
84944888189
-
Sliding Windows succumbs to Big Mac Attack
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
C. D. Walter, Sliding Windows succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), LNCS 2162, Springer-Verlag, 2001, pp. 286-299.
-
(2001)
LNCS
, vol.2162
, pp. 286-299
-
-
Walter, C.D.1
|