-
3
-
-
35248856840
-
-
American National Standards Institute (ANSI) Accredited Standards Committee (ASC) X9 - Financial Services (X9-F). Notice regarding TDES key wrapping techniques, 2002.
-
(2002)
Notice Regarding TDES Key Wrapping Techniques
-
-
-
4
-
-
84956981493
-
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
-
Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, and Teow-Hin Ngair. Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In Security Protocols Workshop, volume 1361, pages 115-124, 1997.
-
(1997)
Security Protocols Workshop
, vol.1361
, pp. 115-124
-
-
Bao, F.1
Deng, R.H.2
Han, Y.3
Jeng, A.B.4
Desai Narasimhalu, A.5
Ngair, T.-H.6
-
5
-
-
0012129278
-
New types of cryptanalytic attacks using related keys
-
Eli Biham. New types of cryptanalytic attacks using related keys. In Advances in Cryptology EUROCRYPT '93, volume 675, pages 398-409, 1994.
-
(1994)
Advances in Cryptology EUROCRYPT '93
, vol.675
, pp. 398-409
-
-
Biham, E.1
-
7
-
-
0035475290
-
API-level attacks on embedded systems
-
Mike Bond and Ross J. Anderson. API-level attacks on embedded systems. Computer, 34(10):67-75, 2001.
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 67-75
-
-
Bond, M.1
Anderson, R.J.2
-
8
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the importance of checking cryptographic protocols for faults. In Advances in Cryptology EUROCRYPT '97, volume 1233, pages 37-51, 1997.
-
(1997)
Advances in Cryptology EUROCRYPT '97
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
13
-
-
0004794569
-
Chinese remaindering based cryptosystems in the presence of faults
-
M. Joye, A. K. Lenstra, and J.-J. Quisquater. Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology, 12(4):241-246, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 241-246
-
-
Joye, M.1
Lenstra, A.K.2
Quisquater, J.-J.3
-
14
-
-
67650338267
-
Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
-
John Kelsey, Bruce Schneier, and David Wagner. Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In Advances in Cryptology - CRYPTO '96, volume 1109, pages 237-251, 1996.
-
(1996)
Advances in Cryptology - CRYPTO '96
, vol.1109
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
15
-
-
0006540774
-
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA
-
John Kelsey, Bruce Schneier, and David Wagner. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA. In 1997 International Conference on Information and Communications Security, Beijing, volume 1334, pages 233-246, 1997.
-
(1997)
1997 International Conference on Information and Communications Security, Beijing
, vol.1334
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
16
-
-
0005789874
-
Attack on private signature keys of the OpenPGP format, PGPTM programs and other applications compatible with OpenPGP
-
Vlastimil Klíma and Tomas Rosa. Attack on private signature keys of the OpenPGP format, PGPTM programs and other applications compatible with OpenPGP. Cryptology ePrint Archive, 2002.
-
(2002)
Cryptology EPrint Archive
-
-
Klíma, V.1
Rosa, T.2
-
17
-
-
26344445171
-
Further results and considerations on side channel attacks on rsa
-
Vlastimil Klíma and Tomas Rosa. Further results and considerations on side channel attacks on rsa. In Cryptographic Hardware and Embedded System - CHES 2002, volume 2523, pages 244-259, 2003.
-
(2003)
Cryptographic Hardware and Embedded System - CHES 2002
, vol.2523
, pp. 244-259
-
-
Klíma, V.1
Rosa, T.2
|