-
3
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
W. Alexi, B. Chor, O. Goldreich, and G. Schnorr. RSA and Rabin functions: Certain parts are as hard as the whole. SIAM J. Computing, 17(2):194-209, 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, G.4
-
6
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Burton S. Kaliski, Jr., editor, Advances in Cryptology-CRYPTO '97, Springer-Verlag
-
Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In Burton S. Kaliski, Jr., editor, Advances in Cryptology-CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 513-525. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
7
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
November
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-863, November 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-863
-
-
Blum, M.1
Micali, S.2
-
8
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Walter Fumy, editor, Advances in Cryptology-EUROCRYPT 97, Springer-Verlag, 11-15 May
-
D. Boneh, R. DeMillo, and R. Lipton. On the importance of checking cryptographic protocols for faults. In Walter Fumy, editor, Advances in Cryptology-EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer-Verlag, 11-15 May 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
11
-
-
0003157491
-
On-line/off-line digital signatures
-
Winter
-
Shimon Even, Oded Goldreich, and Silvio Micali. On-line/off-line digital signatures. Journal of Cryptology, 9(1):35-67, Winter 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
12
-
-
33746075803
-
Tamper Proof Security: Theoretical Foundations for Security Against Hardware Tampering
-
Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, and Tal Rabin. Tamper Proof Security: Theoretical Foundations for Security Against Hardware Tampering. Proceedings of the Theory of Cryptography Conference, 2004.
-
(2004)
Proceedings of the Theory of Cryptography Conference
-
-
Gennaro, R.1
Lysyanskaya, A.2
Malkin, T.3
Micali, S.4
Rabin, T.5
-
16
-
-
0022793132
-
How to Construct Random Functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. Journal of the ACM, 33(4):792-807, October 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
17
-
-
0345253860
-
Construction of pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L.A. Levin, and M. Luby. Construction of pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4):1364-1396, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
18
-
-
35048887406
-
Private circuits: Securing hardware against probing attacks
-
Dan Boneh, editor, Advances in Cryptology-CRYPTO 2003, Springer-Verlag
-
Yuyal Ishai, Amit Sahai, and David Wagner. Private circuits: Securing hardware against probing attacks. In Dan Boneh, editor, Advances in Cryptology-CRYPTO 2003, Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
19
-
-
35048904439
-
-
United states patent 6,510,518: Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems, 21 January
-
Joshua Jaffe, Paul Kocher, and Benjamin Jun. United states patent 6,510,518: Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems, 21 January 2003.
-
(2003)
-
-
Jaffe, J.1
Kocher, P.2
Jun, B.3
-
21
-
-
0003605145
-
Constructing digital signatures from a one way function
-
SRI International, October
-
Leslie Lamport. Constructing digital signatures from a one way function. Technical Report CSL-98, SRI International, October 1979.
-
(1979)
Technical Report CSL-98
-
-
Lamport, L.1
-
22
-
-
84969346266
-
A certified digital signature
-
G. Brassard, editor, Advances in Cryptology-CRYPTO '89, Springer-Verlag, 1990, 20-24 August
-
Ralph C. Merkle. A certified digital signature. In G. Brassard, editor, Advances in Cryptology-CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 218-238. Springer-Verlag, 1990, 20-24 August 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
23
-
-
0038114254
-
Improving smartcard security using self-timed circuits
-
IEEE Computer Society Press
-
S. W Moore, R. J. Anderson, P. Cunningham, R. Mullins, and G. Taylor. Improving smartcard security using self-timed circuits. In Asynch 2002. IEEE Computer Society Press, 2002.
-
(2002)
Asynch 2002
-
-
Moore, S.W.1
Anderson, R.J.2
Cunningham, P.3
Mullins, R.4
Taylor, G.5
-
26
-
-
78650238574
-
Electromagnetic analysis (EMA): Measures and counter-measures for smart cards
-
Smart Card Programming and Security (E-smart 2001) Cannes, France, September
-
Jean-Jacques Quisquater and David Samyde. Electromagnetic analysis (EMA): Measures and counter-measures for smart cards. In Smart Card Programming and Security (E-smart 2001) Cannes, France, volume 2140 of Lecture Notes in Computer Science, pages 200-210, September 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2140
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
27
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
Baltimore, Maryland, 14-16 May
-
John Rompel. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pages 387-394, Baltimore, Maryland, 14-16 May 1990.
-
(1990)
Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing
, pp. 387-394
-
-
Rompel, J.1
-
29
-
-
84887505844
-
-
Michael Wiener, editor. Advances in Cryptology-CRYPTO '99, Springer-Verlag, 15-19 August
-
Michael Wiener, editor. Advances in Cryptology-CRYPTO '99, volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, 15-19 August 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
-
-
-
30
-
-
0020301290
-
Theory and applications of trapdoor functions
-
Chicago, Illinois, 3-5 November IEEE
-
A. C. Yao. Theory and applications of trapdoor functions. In 23rd Annual Symposium on Foundations of Computer Science, pages 80-91, Chicago, Illinois, 3-5 November 1982. IEEE.
-
(1982)
23rd Annual Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.1
|