-
1
-
-
35248871165
-
Zero-Value Point Attacks on Elliptic Curve Cryptosystem
-
2851, Springer-Verlag
-
T. Akishita and T. Takagi, Zero-Value Point Attacks on Elliptic Curve Cryptosystem, ISC 2003, LNCS vol. 2851, Springer-Verlag, 2003, pp. 218-233.
-
(2003)
LNCS
, vol.ISC 2003
, pp. 218-233
-
-
Akishita, T.1
Takagi, T.2
-
2
-
-
84983134283
-
Differential Fault Attacks on Elliptic Curve Cryptosystems, CRYPTO 2000
-
Springer-Verlag
-
I. Biehl, B. Meyer, and V. Muller, Differential Fault Attacks on Elliptic Curve Cryptosystems, CRYPTO 2000, LNCS vol. 1880, Springer-Verlag, 2000, pp. 131-146.
-
(2000)
LNCS
, vol.1880
, pp. 131-146
-
-
Biehl, I.1
Meyer, B.2
Muller, V.3
-
4
-
-
33845275817
-
Sign Change Fault Attacks on Elliptic Curve Cryptosystems, FDTC 2006
-
Springer-Verlag
-
J. Blömer, M. Otto and J.-P. Seifert, Sign Change Fault Attacks on Elliptic Curve Cryptosystems, FDTC 2006, LNCS vol. 4236, Springer-Verlag, 2006, pp. 36-52.
-
(2006)
LNCS
, vol.4236
, pp. 36-52
-
-
Blömer, J.1
Otto, M.2
Seifert, J.-P.3
-
5
-
-
84957355967
-
-
D. Boneh, R.A. Demillo, and R.J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT '97, LNCS 1233, Springer-Verlag, 1997, pp. 37-51.
-
D. Boneh, R.A. Demillo, and R.J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT '97, LNCS vol. 1233, Springer-Verlag, 1997, pp. 37-51.
-
-
-
-
6
-
-
0142156711
-
-
M. Ciet and M. Joye, (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography, ICICS 2003, LNCS 2836, Springer-Verlag, 2003, pp. 348-359.
-
M. Ciet and M. Joye, (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography, ICICS 2003, LNCS vol. 2836, Springer-Verlag, 2003, pp. 348-359.
-
-
-
-
7
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
1717, Springer-Verlag
-
J.-S. Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, CHES 1999, LNCS vol. 1717, Springer-Verlag, 1999, pp. 292-302.
-
(1999)
LNCS
, vol.CHES 1999
, pp. 292-302
-
-
Coron, J.-S.1
-
8
-
-
35248881073
-
The Doubling Attack - Why Upwards Is Better Than Downwards
-
2779, Springer-Verlag
-
P. Fouque and F. Valette, The Doubling Attack - Why Upwards Is Better Than Downwards, CHES 2003, LNCS vol. 2779, Springer-Verlag, 2003, pp. 269-280.
-
(2003)
LNCS
, vol.CHES 2003
, pp. 269-280
-
-
Fouque, P.1
Valette, F.2
-
9
-
-
35248816371
-
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, PKC 2003
-
Springer-Verlag
-
L. Goubin, A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, PKC 2003, LNCS vol. 2567, Springer-Verlag, 2003, pp. 199-210.
-
(2003)
LNCS
, vol.2567
, pp. 199-210
-
-
Goubin, L.1
-
11
-
-
84944901711
-
Protections against Differential Analysis for Elliptic Curve Cryptography - An Algebraic Approach
-
2162, SpringerVerlag
-
M. Joye and C. Tymen, Protections against Differential Analysis for Elliptic Curve Cryptography - An Algebraic Approach, CHES 2001, LNCS vol. 2162, SpringerVerlag, 2001, pp. 377-390.
-
(2001)
LNCS
, vol.CHES 2001
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
12
-
-
35248874869
-
The Montgomery Powering Ladder
-
2523, Springer-Verlag
-
M. Joye and S.-M. Yen, The Montgomery Powering Ladder, CHES 2002, LNCS vol. 2523, Springer-Verlag, 2002, pp. 291-302.
-
(2002)
LNCS
, vol.CHES 2002
, pp. 291-302
-
-
Joye, M.1
Yen, S.-M.2
-
13
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, Elliptic Curve Cryptosystems, Mathematics Computation, 48, 1987, pp. 203-209.
-
(1987)
Mathematics Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
14
-
-
84939573910
-
Differential Power Analysis, CRYPTO '99
-
Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, CRYPTO '99, LNCS vol. 1666, Springer-Verlag, 1999, pp. 388-397.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
84947913604
-
m) without Precomputation
-
1717, Springer-Verlag
-
m) without Precomputation, CHES 1999, LNCS vol. 1717, Springer-Verlag, 1999, pp. 316-327.
-
(1999)
LNCS
, vol.CHES 1999
, pp. 316-327
-
-
López, J.1
Dahab, R.2
-
16
-
-
35048860937
-
Efficient Countermeasures Against RPA, DPA, and SPA
-
3156, Springer-Verlag
-
H. Mamiya, A. Miyaji and H. Morimoto, Efficient Countermeasures Against RPA, DPA, and SPA, CHES 2004, LNCS vol. 3156, Springer-Verlag, 2004, pp. 343-356.
-
(2004)
LNCS
, vol.CHES 2004
, pp. 343-356
-
-
Mamiya, H.1
Miyaji, A.2
Morimoto, H.3
-
19
-
-
85015402934
-
Use of Elliptic Curves in Cryptography, CRYPTO
-
218, Springer-Verlag
-
V.S. Miller, Use of Elliptic Curves in Cryptography, CRYPTO 85, LNCS vol. 218, Springer-Verlag, 1986, pp. 417-426.
-
(1986)
LNCS
, vol.85
, pp. 417-426
-
-
Miller, V.S.1
-
20
-
-
84968484435
-
Speeding the Pollard and Elliptic Curve Methods of Factorization
-
P.L. Montgomery, Speeding the Pollard and Elliptic Curve Methods of Factorization, Mathematics of Computation, 48, 1987, pp. 243-264.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 243-264
-
-
Montgomery, P.L.1
|