-
1
-
-
84948986458
-
Optimal Asymetric Encryption - How to Encrypt with RSA
-
LNCS 950, Springer-Verlag
-
M. Bellare and P. Rogaway. Optimal Asymetric Encryption - How to Encrypt with RSA. In Eurocrypt '94, LNCS 950, pages 92-111. Springer-Verlag, 1994.
-
(1994)
Eurocrypt '94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
0020915882
-
Blind Signatures for Untraceable Payments
-
Plenum, NY
-
D. Chaum. Blind Signatures for Untraceable Payments. In Crypto '82, pages 199-203. Plenum, NY, 1983.
-
(1983)
Crypto '82
, pp. 199-203
-
-
Chaum, D.1
-
3
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve
-
LNCS 1717, Springer-Verlag
-
J.S. Coron. Resistance against differential power analysis for elliptic curve. In CHES '99, LNCS 1717, pages 292-302. Springer-Verlag, 1999.
-
(1999)
CHES '99
, pp. 292-302
-
-
Coron, J.S.1
-
4
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
July
-
T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In IEEE Transactions on Information Theory, volume IT-31, no. 4, pages 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
5
-
-
35248816371
-
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
-
LNCS 2567, Springer-Verlag
-
L. Goubin. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. In PKC '2003, LNCS 2567, pages 199-210. Springer-Verlag, 2003.
-
(2003)
PKC '2003
, pp. 199-210
-
-
Goubin, L.1
-
6
-
-
23944477254
-
Randomized signed-scalar Multiplication of ECC to resist Power Attacks
-
Springer Verlag
-
J. Ha and S. Moon. Randomized signed-scalar Multiplication of ECC to resist Power Attacks. In Pre-Proceeding CHES'02, pages 553-565. Springer Verlag, 2002.
-
(2002)
Pre-Proceeding CHES'02
, pp. 553-565
-
-
Ha, J.1
Moon, S.2
-
7
-
-
35248835491
-
DPA Countermeasures by Improving the Window Method
-
Springer Verlag
-
K. Itoh, J. Yajima, M. Takenaka, and N. Torii. DPA Countermeasures by Improving the Window Method. In Pre-Proceeding CHES'02, pages 304-319. Springer Verlag, 2002.
-
(2002)
Pre-Proceeding CHES'02
, pp. 304-319
-
-
Itoh, K.1
Yajima, J.2
Takenaka, M.3
Torii, N.4
-
8
-
-
84974665915
-
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
-
LNCS 2551 Springer-Verlag
-
T. Izu, B. Moller and T. Takagi. Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. In IndoCrypt '2002, LNCS 2551, pages 296-313. Springer-Verlag, 2002.
-
(2002)
IndoCrypt '2002
, pp. 296-313
-
-
Izu, T.1
Moller, B.2
Takagi, T.3
-
9
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems
-
LNCS 1109, Springer-Verlag
-
P.C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems. In Crypto '96, LNCS 1109, pages 104-113. Springer-Verlag, 1996.
-
(1996)
Crypto '96
, pp. 104-113
-
-
Kocher, P.C.1
-
10
-
-
84939573910
-
Differential Power Analysis
-
LNCS 1666, Springer-Verlag
-
P.C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Crypto '99, LNCS 1666, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Crypto '99
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
11
-
-
0006491634
-
Power Analysis Attack of Modular Exponentiation in Smartcards
-
LNCS 1717. Springer-Verlag
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attack of Modular Exponentiation in Smartcards. In CHES '99, LNCS 1717. Springer-Verlag, 1999.
-
(1999)
CHES '99
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
12
-
-
0000266095
-
Speeding up the computation on an elliptic curve using addition-substraction chains
-
F. Morain and J. Olivos. Speeding up the computation on an elliptic curve using addition-substraction chains. Inform Theory Appl., 24:531-543, 1990.
-
(1990)
Inform Theory Appl.
, vol.24
, pp. 531-543
-
-
Morain, F.1
Olivos, J.2
-
13
-
-
0003508562
-
-
Federal Information Processing Standards PUBlication 186-2, february
-
NIST. Digital Signature Standard (DSS). Federal Information Processing Standards PUBlication 186-2, february 2000.
-
(2000)
Digital Signature Standard (DSS)
-
-
-
14
-
-
84945314413
-
A second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
-
LNCS 2433, Springer-Verlag
-
K. Okeya and K. Sakurai. A second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. In ISC '2002, LNCS 2433, pages 389-401. Springer-Verlag, 2002.
-
(2002)
ISC '2002
, pp. 389-401
-
-
Okeya, K.1
Sakurai, K.2
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
16
-
-
33646165628
-
A New Class of Collision Attacks and its Application to DES
-
LNCS, pages -. Springer-Verlag
-
K. Schramm, T. Wollinger, and C. Paar. A New Class of Collision Attacks and its Application to DES. In FSE '2003, LNCS, pages -. Springer-Verlag, 2003.
-
(2003)
FSE '2003
-
-
Schramm, K.1
Wollinger, T.2
Paar, C.3
-
17
-
-
24744463146
-
Implementation of Elliptic Curve Cryptography with Built-in Counter Measures against Side Channel Attacks
-
Springer Verlag
-
E. Trichina and A. Bellezza. Implementation of Elliptic Curve Cryptography with Built-in Counter Measures against Side Channel Attacks. In Pre-Proceeding CHES'02, pages 98-113. Springer Verlag, 2002.
-
(2002)
Pre-Proceeding CHES'02
, pp. 98-113
-
-
Trichina, E.1
Bellezza, A.2
|