-
1
-
-
0003735741
-
ANSI X9.62, Public Key Cryptography for the Financial Services Industry
-
ANSI X9.62, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), (1999).
-
(1999)
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
-
-
2
-
-
84958979095
-
Weierstrass Elliptic Curves and Side-Channel Attacks
-
Public Key Cryptography (PKC2002)
-
Brier, É., Joye, M., Weierstrass Elliptic Curves and Side-Channel Attacks, Public Key Cryptography (PKC2002), LNCS2274, (2002), 335-345.
-
(2002)
LNCS
, vol.2274
, pp. 335-345
-
-
Brier, É.1
Joye, M.2
-
4
-
-
84947743704
-
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
-
Advances in Cryptology - ASIACRYPT '98
-
Cohen, H., Miyaji, A., Ono, T., Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, Advances in Cryptology - ASIACRYPT '98, LNCS1514, (1998), 51-65.
-
(1998)
LNCS
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
5
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Cryptographic Hardware and Embedded Systems (CHES'99)
-
Coron, J. S., Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES'99), LNCS1717, (1999), 292-302.
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.S.1
-
8
-
-
84947425200
-
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
-
Information Security and Privacy, 7th Australasian Conference, (ACISP 2002)
-
Hitchcock, Y., Montague, P., A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis, Information Security and Privacy, 7th Australasian Conference, (ACISP 2002), LNCS2384, (2002), 214-225.
-
(2002)
LNCS
, vol.2384
, pp. 214-225
-
-
Hitchcock, Y.1
Montague, P.2
-
9
-
-
24144492015
-
Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA
-
Itoh, K., Izu, T., and Takenaka, M., Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA, to appear in Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), 2002.
-
(2002)
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
10
-
-
35248835491
-
DPA Countermeasures by improving the Window Method
-
Itoh, K., Yajima, J., Takenaka, M., and Torii, N., DPA Countermeasures by improving the Window Method, to appear in Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), 2002.
-
(2002)
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002)
-
-
Itoh, K.1
Yajima, J.2
Takenaka, M.3
Torii, N.4
-
12
-
-
84958955271
-
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
-
Public Key Cryptography (PKC2002)
-
Izu, T., Takagi, T., A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks, Public Key Cryptography (PKC2002), LNCS2274, (2002), 280-296.
-
(2002)
LNCS
, vol.2274
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
13
-
-
84944884283
-
Hessian elliptic curves and side-channel attacks
-
Cryptographic Hardware and Embedded Systems (CHES'01)
-
Joye, M., Quisquater, J. J., Hessian elliptic curves and side-channel attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 402-410.
-
(2001)
LNCS
, vol.2162
, pp. 402-410
-
-
Joye, M.1
Quisquater, J.J.2
-
14
-
-
84937395009
-
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography
-
Public Key Cryptography 2001 (PKC2001)
-
Joye, M., Tymen, C., Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography, Public Key Cryptography 2001 (PKC2001), pp.353-364, LNCS 1992, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 353-364
-
-
Joye, M.1
Tymen, C.2
-
15
-
-
84944901711
-
Protections against differential analysis for elliptic curve cryptography: An algebraic approach
-
Cryptographic Hardware and Embedded Systems (CHES'01)
-
Joye, M., Tymen, C., Protections against differential analysis for elliptic curve cryptography: An algebraic approach, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 377-390.
-
(2001)
LNCS
, vol.2162
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
16
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N., Elliptic curve cryptosystems, Math. Comp. 48, (1987), 203-209.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
17
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - CRYPTO '96
-
Kocher, C., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology - CRYPTO '96, LNCS1109, (1996), 104-113.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, C.1
-
18
-
-
84939573910
-
Differential Power Analysis
-
Advances in Cryptology - CRYPTO '99
-
Kocher, C., Jaffe, J., Jun, B., Differential Power Analysis, Advances in Cryptology - CRYPTO '99, LNCS1666, (1999), 388-397.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, C.1
Jaffe, J.2
Jun, B.3
-
19
-
-
84957354181
-
Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method
-
Advances in Cryptology - CRYPTO '92
-
K. Koyama and Y. Tsuruoka, Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method, Advances in Cryptology - CRYPTO '92, LNCS740, (1992), pp.345-357.
-
(1992)
LNCS
, vol.740
, pp. 345-357
-
-
Koyama, K.1
Tsuruoka, Y.2
-
20
-
-
84944898712
-
Preventing SPA/DPA in ECC systems using the Jacobi form
-
Cryptographic Hardware and Embedded System (CHES'01)
-
Liardet, P. Y., Smart, N. P., Preventing SPA/DPA in ECC systems using the Jacobi form, Cryptographic Hardware and Embedded System (CHES'01), LNCS2162, (2001), 391-401.
-
(2001)
LNCS
, vol.2162
, pp. 391-401
-
-
Liardet, P.Y.1
Smart, N.P.2
-
21
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Advances in Cryptology - CRYPTO '85
-
Miller, V. S., Use of elliptic curves in cryptography, Advances in Cryptology - CRYPTO '85, LNCS218,(1986), pp.417-426.
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
22
-
-
2142786147
-
Efficient elliptic curve exponentiation
-
Atsuko Miyaji, Takatoshi Ono, Henri Cohen, Efficient elliptic curve exponentiation, Information and Communication Security (ICICS 1997), (1997), pp.282-291.
-
(1997)
Information and Communication Security (ICICS 1997)
, pp. 282-291
-
-
Miyaji, A.1
Ono, T.2
Cohen, H.3
-
23
-
-
84947262754
-
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
-
Information Security (ISC2001)
-
Möller, B., Securing Elliptic Curve Point Multiplication against Side-Channel Attacks, Information Security (ISC2001), LNCS2200, (2001), 324-334.
-
(2001)
LNCS
, vol.2200
, pp. 324-334
-
-
Möller, B.1
-
25
-
-
84945249400
-
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
-
Information Security Conference (ISC 2002)
-
Möller, B., Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 402-413.
-
(2002)
LNCS
, vol.2433
, pp. 402-413
-
-
Möller, B.1
-
26
-
-
35248856798
-
-
National Institute of Standards and Technology, FIPS 186-2, http://csrc.nist.gov/publication/fips/fips186-2/fips186-2.pdf
-
FIPS 186-2
-
-
-
27
-
-
84944889933
-
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
-
Cryptographic Hardware and Embedded Systems (CHES'01)
-
Oswald, E., Aigner, M., Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems (CHES'01), LNCS2162, (2001), 39-50.
-
(2001)
LNCS
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
28
-
-
84949949652
-
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks
-
The 4th International Conference on Information Security and Cryptology (ICISC 2001)
-
Okeya, K., Miyazaki, K., Sakurai, K., A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks, The 4th International Conference on Information Security and Cryptology (ICISC 2001), LNCS2288, (2002), 428-439.
-
(2002)
LNCS
, vol.2288
, pp. 428-439
-
-
Okeya, K.1
Miyazaki, K.2
Sakurai, K.3
-
29
-
-
84947733936
-
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
-
Progress in Cryptology - INDOCRYPT 2000
-
Okeya, K., Sakurai, K., Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack, Progress in Cryptology - INDOCRYPT 2000, LNCS1977, (2000), 178-190.
-
(2000)
LNCS
, vol.1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
30
-
-
84947425601
-
On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
-
The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002)
-
Okeya, K., Sakurai, K., On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling, The 7th Australasian Conference in Information Security and Privacy, (ACISP 2002), LNCS2384, (2002), 420-435.
-
(2002)
LNCS
, vol.2384
, pp. 420-435
-
-
Okeya, K.1
Sakurai, K.2
-
31
-
-
35248872362
-
Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick
-
Okeya, K., Sakurai, K., Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick, Cryptographic Hardware and Embedded System (CHES 2002), Pre-Proceedings, (2002), 566-581.
-
(2002)
Cryptographic Hardware and Embedded System (CHES 2002), Pre-Proceedings
, pp. 566-581
-
-
Okeya, K.1
Sakurai, K.2
-
32
-
-
84945314413
-
A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks
-
Information Security Conference (ISC 2002)
-
Okeya, K., Sakurai, K., A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks, Information Security Conference (ISC 2002), LNCS 2433, (2002), 389-401.
-
(2002)
LNCS
, vol.2433
, pp. 389-401
-
-
Okeya, K.1
Sakurai, K.2
-
34
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol.21, No.2, (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
35
-
-
35248894236
-
-
Standards for Efficient Cryptography Group (SECG), http://www.secg.org
-
-
-
-
36
-
-
0010029876
-
Efficient Arithmetic on Koblitz Curves
-
Solinas, J. A., Efficient Arithmetic on Koblitz Curves, Design, Codes and Cryptography, 19, (2000), 195-249.
-
(2000)
Design, Codes and Cryptography
, vol.19
, pp. 195-249
-
-
Solinas, J.A.1
-
38
-
-
0842283870
-
Breaking the Liardet-Smart Randomized Exponentiation Algorithm
-
Walter, C. D., Breaking the Liardet-Smart Randomized Exponentiation Algorithm, to apper in CARDIS'02.
-
CARDIS'02
-
-
Walter, C.D.1
|