-
2
-
-
0002380073
-
Tamper Resistance - A Cautionary Note
-
USENIX Press
-
R. Anderson, M. Kuhn, "Tamper Resistance - A Cautionary Note," USENIX E-Commerce Workshop, USENIX Press, 1996, pp.1-11.
-
(1996)
USENIX E-Commerce Workshop
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
3
-
-
0141481639
-
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
-
Springer
-
R. Anderson, M. Kuhn, "Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations," Proc. 2nd Workshop on Information Hiding, Springer, 1998.
-
(1998)
Proc. 2nd Workshop on Information Hiding
-
-
Anderson, R.1
Kuhn, M.2
-
4
-
-
0011188089
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. CRYPTO 2001, 2001.
-
(2001)
CRYPTO 2001
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
85154002090
-
Sorting Networks and their Applications
-
K. Batcher. Sorting Networks and their Applications. In Proc. AFiPS Spring Joint Conference, Vol. 32, 1988, pp. 307-314.
-
(1988)
Proc. AFiPS Spring Joint Conference
, vol.32
, pp. 307-314
-
-
Batcher, K.1
-
6
-
-
0002531104
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, 1988.
-
(1988)
Proc. of 20th STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
7
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Springer-Verlag
-
D. Boneh, R.A. Demillo, R.J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," EUROCRYPT'97, Springer-Verlag, 1997, pp.37-51.
-
(1997)
EUROCRYPT'97
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. In J. of Cryptology, 13(1), 2000.
-
(2000)
J. of Cryptology
, vol.13
, Issue.1
-
-
Canetti, R.1
-
9
-
-
84948973494
-
Exposure-Resilient Functions and All-or-Nothing Transforms
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz and A. Sahai. Exposure-Resilient Functions and All-or-Nothing Transforms. In EUROCRYPT 2000, pages 453-469.
-
EUROCRYPT 2000
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
10
-
-
84984842401
-
Maintaining Security in the Presence of Transient Faults
-
R. Canetti and A. Herzberg. Maintaining Security in the Presence of Transient Faults. In CRYPTO 1994, pages 425-438.
-
CRYPTO 1994
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
11
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Springer-Verlag
-
S. Chari, C.S. Jutla, J.R. Rao, P. Rohatgi, "Towards Sound Approaches to Counteract Power-Analysis Attacks," CRYPTO'99, Springer-Verlag, 1999, pp.398-412.
-
(1999)
CRYPTO'99
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
13
-
-
0002626155
-
General secure multi-party computation from any linear secret-sharing scheme
-
R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In Proc. of EUROCRYPT '00.
-
Proc. of EUROCRYPT '00
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
14
-
-
68549105908
-
On Boolean and Arithmetic Masking against Differential Power Analysis
-
Springer-Verlag
-
J.-S. Coron, L. Goubin, "On Boolean and Arithmetic Masking against Differential Power Analysis," CHES'00, Springer-Verlag, pp.231-237.
-
CHES'00
, pp. 231-237
-
-
Coron, J.-S.1
Goubin, L.2
-
15
-
-
0004777155
-
Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals
-
Mar.
-
J. Daemen, V. Rijmen, "Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals," AES'99, Mar. 1999.
-
(1999)
AES'99
-
-
Daemen, J.1
Rijmen, V.2
-
16
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results
-
CHES'01, Springer-Verlag
-
K. Gandolfi, C. Mourtel, F. Olivier, "Electromagnetic Analysis: Concrete Results," CHES'01, LNCS 2162, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
17
-
-
17444394365
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
R. Gennaro, M. O. Rabin, and T. Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In Proc. of 17th PODC, 1998.
-
(1998)
Proc. of 17th PODC
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
18
-
-
0022793132
-
How to construct random functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. JACM, 33(4):792-807, October 1986.
-
(1986)
JACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
20
-
-
0030149547
-
Software Protection and Simulation on Oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software Protection and Simulation on Oblivious RAMs. JACM 43(3): 431-473, 1996.
-
(1996)
JACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
21
-
-
84949520149
-
DES and Differential Power Analysis - The Duplication Method
-
Springer-Verlag
-
L. Goubin, J. Patarin, "DES and Differential Power Analysis - The Duplication Method," CHES'99, Springer-Verlag, 1999, pp.158-172.
-
(1999)
CHES'99
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
22
-
-
84974731648
-
Robustness for free in unconditional multi-party computation
-
M. Hirt and U. Maurer. Robustness for free in unconditional multi-party computation. In Proc. of CRYPTO '01.
-
Proc. of CRYPTO '01
-
-
Hirt, M.1
Maurer, U.2
-
24
-
-
84958769993
-
Side Channel Cryptanalysis of Product Ciphers
-
ESORICS'98, Springer-Verlag
-
J. Kelsey, B. Schneier, D. Wagner, "Side Channel Cryptanalysis of Product Ciphers," ESORICS'98, LNCS 1485, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1485
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
25
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Springer-Verlag
-
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," CRYPTO'96, Springer-Verlag, 1996, pp.104-113.
-
(1996)
CRYPTO'96
, pp. 104-113
-
-
Kocher, P.1
-
26
-
-
84939573910
-
Differential Power Analysis
-
Springer-Verlag
-
P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis," CRYPTO'99, Springer-Verlag, 1999, pp.388-397.
-
(1999)
CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
27
-
-
23044523291
-
Securing the AES Finalists Against Power Analysis Attacks
-
Springer-Verlag
-
T.S. Messerges, "Securing the AES Finalists Against Power Analysis Attacks," FSE'00, Springer-Verlag, 2000.
-
(2000)
FSE'00
-
-
Messerges, T.S.1
-
32
-
-
33746082293
-
Eddy current for Magnetic Analysis with Active Sensor
-
Sept.
-
J.-J. Quisquater, D. Samyde, "Eddy current for Magnetic Analysis with Active Sensor," Esmart 2002, Sept. 2002.
-
(2002)
Esmart 2002
-
-
Quisquater, J.-J.1
Samyde, D.2
-
33
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
-
Esmart 2001, Springer-Verlag
-
J.-J. Quisquater, D. Samyde, "ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards," Esmart 2001, LNCS 2140, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2140
-
-
Quisquater, J.-J.1
Samyde, D.2
-
36
-
-
0022218742
-
Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk
-
W. van Eck, "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk," Computers & Security, v.4, 1985, pp.269-286.
-
(1985)
Computers & Security
, vol.4
, pp. 269-286
-
-
Van Eck, W.1
-
37
-
-
0038794800
-
-
Viking Penguin Inc.
-
D. Wright, Spycatcher, Viking Penguin Inc., 1987.
-
(1987)
Spycatcher
-
-
Wright, D.1
-
38
-
-
0003113271
-
How to generate and exchange secrets
-
A. C. Yao. How to generate and exchange secrets. In Proc. of 27th FOCS, 1986.
-
(1986)
Proc. of 27th FOCS
-
-
Yao, A.C.1
|