-
1
-
-
11244271401
-
-
ANSI X9.62, Public Key Cryptography for the Financial Services Industry
-
ANSI X9.62, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), (1998).
-
(1998)
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
-
-
2
-
-
84958979095
-
Weierstrass Elliptic Curves and Side-Channel Attacks
-
Public Key Cryptography (PKC2002)
-
Brier, E., Joye, M., Weierstrass Elliptic Curves and Side-Channel Attacks, Public Key Cryptography (PKC2002), LNCS 2274, (2002), 335-345.
-
(2002)
LNCS
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
4
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Cryptographic Hardware and Embedded Systems (CHES'99)
-
Coron, J.S., Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES'99), LNCS 1717, (1999), 292-302.
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.S.1
-
6
-
-
35248816371
-
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
-
Public Key Cryptography, (PKC 2003)
-
Goubin, L., A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, Public Key Cryptography, (PKC 2003), LNCS 2567, (2003), 199-211.
-
(2003)
LNCS
, vol.2567
, pp. 199-211
-
-
Goubin, L.1
-
7
-
-
35248877672
-
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks
-
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
-
Ha, J., and Moon, S., Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 551-563.
-
(2002)
LNCS
, vol.2523
, pp. 551-563
-
-
Ha, J.1
Moon, S.2
-
8
-
-
35248857338
-
Cryptanalysis of the Full version Randomized Addition-Subtraction Chains
-
Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu, Cryptanalysis of the Full version Randomized Addition-Subtraction Chains, to appear in ACISP 2003.
-
ACISP 2003
-
-
Han, D.-G.1
Chang, N.S.2
Jung, S.W.3
Park, Y.-H.4
Kim, C.H.5
Ryu, H.6
-
9
-
-
35248898400
-
Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA
-
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
-
Itoh, K., Izu, T., and Takenaka, M-, Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 129-143.
-
(2002)
LNCS
, vol.2523
, pp. 129-143
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
10
-
-
35248818852
-
DPA Countermeasures by improving the Window Method
-
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
-
Itoh, K., Yajima, J., Takenaka, M., and Torii, N., DPA Countermeasures by improving the Window Method, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 318-332.
-
(2002)
LNCS
, vol.2523
, pp. 318-332
-
-
Itoh, K.1
Yajima, J.2
Takenaka, M.3
Torii, N.4
-
12
-
-
84958955271
-
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
-
Public Key Cryptography (PKC2002)
-
Izu, T., Takagi, T., A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks, Public Key Cryptography (PKC2002), LNCS 2274, (2002), 280-296.
-
(2002)
LNCS
, vol.2274
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
13
-
-
84944884283
-
Hessian elliptic curves and side-channel attacks
-
Cryptographic Hardware and Embedded Systems (CHES'01)
-
Joye, M., Quisquater, J.J., Hessian elliptic curves and side-channel attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS 2162, (2001), 402-410.
-
(2001)
LNCS
, vol.2162
, pp. 402-410
-
-
Joye, M.1
Quisquater, J.J.2
-
14
-
-
84944901711
-
Protections against differential analysis for elliptic curve cryptography: An algebraic approach
-
Cryptographic Hardware and Embedded Systems (CHES'01)
-
Joye, M., Tymen, C., Protections against differential analysis for elliptic curve cryptography: An algebraic approach, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 377-390.
-
(2001)
LNCS
, vol.2162
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
15
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N., Elliptic curve cryptosystems, Math. Comp. 48, (1987), 203-209.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
16
-
-
84939573910
-
Differential Power Analysis
-
Advances in Cryptology - CRYPTO '99
-
Kocher, C., Jaffe, J., Jun, B., Differential Power Analysis, Advances in Cryptology - CRYPTO '99, LNCS 1666, (1999), 388-397.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, C.1
Jaffe, J.2
Jun, B.3
-
17
-
-
84957354181
-
Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method
-
Advances in Cryptology - CRYPTO '92
-
K. Koyama and Y. Tsuruoka, Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method, Advances in Cryptology - CRYPTO '92, LNCS 740, (1992), 345-357.
-
(1992)
LNCS
, vol.740
, pp. 345-357
-
-
Koyama, K.1
Tsuruoka, Y.2
-
18
-
-
84944898712
-
Preventing SPA/DPA in ECC systems using the Jacobi form
-
Cryptographic Hardware and Embedded System (CHES'01)
-
Liardet, P.Y., Smart, N.P., Preventing SPA/DPA in ECC systems using the Jacobi form, Cryptographic Hardware and Embedded System (CHES'01), LNCS2162, (2001), 391-401.
-
(2001)
LNCS
, vol.2162
, pp. 391-401
-
-
Liardet, P.Y.1
Smart, N.P.2
-
19
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Advances in Cryptology - CRYPTO '85
-
Miller, V.S., Use of elliptic curves in cryptography, Advances in Cryptology - CRYPTO '85, LNCS218, (1986), 417-426.
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
20
-
-
2142786147
-
Efficient elliptic curve exponentiation
-
Atsuko Miyaji, Takatoshi Ono, Henri Cohen, Efficient elliptic curve exponentiation, Information and Communication Security (ICICS 1997), (1997), 282-291.
-
(1997)
Information and Communication Security (ICICS 1997)
, pp. 282-291
-
-
Miyaji, A.1
Ono, T.2
Cohen, H.3
-
21
-
-
84947262754
-
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
-
Information Security (ISC2001)
-
Möller, B., Securing Elliptic Curve Point Multiplication against Side-Channel Attacks, Information Security (ISC2001), LNCS2200, (2001), 324-334.
-
(2001)
LNCS
, vol.2200
, pp. 324-334
-
-
Möller, B.1
-
23
-
-
84945249400
-
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
-
Information Security Conference (ISC 2002)
-
Möller, B., Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 402-413.
-
(2002)
LNCS
, vol.2433
, pp. 402-413
-
-
Möller, B.1
-
24
-
-
35248820671
-
Improved Techniques for Fast Exponentiation
-
The 5th International Conference on Information Security and Cryptology (ICISC 2002)
-
Möller, B., Improved Techniques for Fast Exponentiation, The 5th International Conference on Information Security and Cryptology (ICISC 2002), LNCS 2587, (2003), 298-312.
-
(2003)
LNCS
, vol.2587
, pp. 298-312
-
-
Möller, B.1
-
25
-
-
35248816353
-
-
FIPS 186-2
-
National Institute of Standards and Technology, FIPS 186-2, http://csrc.nist.gov/publication/fips/fips186-2/fips186-2.pdf
-
-
-
-
26
-
-
84944889933
-
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
-
Cryptographic Hardware and Embedded Systems (CHES'01)
-
Oswald, E., Aigner, M., Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 39-50.
-
(2001)
LNCS
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
27
-
-
84947733936
-
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
-
Progress in Cryptology - INDOCRYPT 2000
-
Okeya, K., Sakurai, K., Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack, Progress in Cryptology - INDOCRYPT 2000, LNCS1977, (2000), 178-190.
-
(2000)
LNCS
, vol.1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
28
-
-
84947425601
-
On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability be-tween Addition and Doubling
-
The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002)
-
Okeya, K., Sakurai, K., On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability be-tween Addition and Doubling, The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002), LNCS2384, (2002), 420-435.
-
(2002)
LNCS
, vol.2384
, pp. 420-435
-
-
Okeya, K.1
Sakurai, K.2
-
29
-
-
84945314413
-
A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks
-
Information Security Conference (ISC 2002)
-
Okeya, K., Sakurai, K., A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 389-401.
-
(2002)
LNCS
, vol.2433
, pp. 389-401
-
-
Okeya, K.1
Sakurai, K.2
-
30
-
-
84939214123
-
A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks
-
these proceedings
-
Okeya, K., Sakurai, K., A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks, in 2003 IEEE Information Theory Workshop (ITW 2003) (these proceedings), (2003).
-
(2003)
2003 IEEE Information Theory Workshop (ITW 2003)
-
-
Okeya, K.1
Sakurai, K.2
-
31
-
-
35248821853
-
Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
-
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
-
Oswald, E., Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 82-97.
-
(2002)
LNCS
, vol.2523
, pp. 82-97
-
-
Oswald, E.1
-
32
-
-
35248865717
-
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks
-
Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003)
-
Okeya, K., Takagi, T., The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks, Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003), LNCS2612, (2003), 328-342.
-
(2003)
LNCS
, vol.2612
, pp. 328-342
-
-
Okeya, K.1
Takagi, T.2
-
33
-
-
35248889353
-
-
Standards for Efficient Cryptography Group (SECG), http://www.secg.org
-
-
-
-
34
-
-
0010029876
-
Efficient Arithmetic on Koblitz Curves
-
Solinas, J.A., Efficient Arithmetic on Koblitz Curves, Design, Codes and Cryptography, 19, (2000), 195-249.
-
(2000)
Design, Codes and Cryptography
, vol.19
, pp. 195-249
-
-
Solinas, J.A.1
-
35
-
-
0038123605
-
Some Security Aspects of the Mist Randomized Exponentiation Algorithm
-
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
-
Walter, C.D., Some Security Aspects of the Mist Randomized Exponentiation Algorithm, Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), LNCS 2523, (2002), 564-578.
-
(2002)
LNCS
, vol.2523
, pp. 564-578
-
-
Walter, C.D.1
-
36
-
-
0842283870
-
Breaking the Liardet-Smart Randomized Exponentiation Algorithm
-
USENIX Assoc
-
Walter, C.D., Breaking the Liardet-Smart Randomized Exponentiation Algorithm, Proceedings of CARDIS'02, USENIX Assoc, (2002), 59-68.
-
(2002)
Proceedings of CARDIS'02
, pp. 59-68
-
-
Walter, C.D.1
-
37
-
-
33645596424
-
-
International Association for Cryptologic Research (IACR), Cryptology ePrint Archive 2003/013
-
Walter, C.D., Security Constraints on the Oswald-Aigner Exponentiation Algorithm, International Association for Cryptologic Research (IACR), Cryptology ePrint Archive 2003/013, (2003). http://eprint.iacr.org/2003/013/
-
(2003)
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
-
-
Walter, C.D.1
-
38
-
-
35048848043
-
Seeing through Mist Given a Small Fraction of an RSA Private Key, Topics in Cryptology
-
Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003)
-
Walter, C.D., Seeing through Mist Given a Small Fraction of an RSA Private Key, Topics in Cryptology, Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003 (CT-RSA 2003), LNCS2612, (2003), 391-402.
-
(2003)
LNCS
, vol.2612
, pp. 391-402
-
-
Walter, C.D.1
|