-
1
-
-
84944905303
-
-
Clavier, C., Joye, M.: Universal exponentiation algorithm. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 300-308. Springer, Heidelberg (2001)
-
Clavier, C., Joye, M.: Universal exponentiation algorithm. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 300-308. Springer, Heidelberg (2001)
-
-
-
-
2
-
-
33750833266
-
A secure and practical CRT-based RSA to resist side channel attacks
-
Lagana, A, Gavrilova, M, Kumar, V, Mun, Y, Tan, C.J.K, Gervasi, O, eds, ICCSA 2004, Springer, Heidelberg
-
Kim, C., Ha, J., Kim, S., Kim, S., Yen, S., Moon, S.: A secure and practical CRT-based RSA to resist side channel attacks. In: Lagana, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 150-158. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3043
, pp. 150-158
-
-
Kim, C.1
Ha, J.2
Kim, S.3
Kim, S.4
Yen, S.5
Moon, S.6
-
3
-
-
33745818850
-
-
Muller, F., Valette, F.: High-order attacks against the exponent splitting protection. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 315-329. Springer, Heidelberg (2006)
-
Muller, F., Valette, F.: High-order attacks against the exponent splitting protection. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 315-329. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
35048860937
-
-
Mamiya, H., Miyaji, A., Morimoto, H.: Efficient countermeasure against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 343-356. Springer, Heidelberg (2004)
-
Mamiya, H., Miyaji, A., Morimoto, H.: Efficient countermeasure against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 343-356. Springer, Heidelberg (2004)
-
-
-
-
5
-
-
84880293917
-
-
Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
-
Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
-
-
-
-
6
-
-
84902477345
-
Efficient countermeasure against power analysis for elliptic curve cryptosystems
-
Kluwer Academic Pub, Dordrecht
-
Itoh, K., Izu, T., Takenaka, M.: Efficient countermeasure against power analysis for elliptic curve cryptosystems. In: Smart Card Research and Advanced Applications VI - CARDIS 2004, pp. 99-113. Kluwer Academic Pub, Dordrecht (2004)
-
(2004)
Smart Card Research and Advanced Applications VI - CARDIS
, pp. 99-113
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
7
-
-
35248898400
-
-
Itoh, K., Izu, T., Takenaka, M.: Address-differential power analysis of cryptographic scheme OK-ECDH and OK-ECDSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 129-143. Springer, Heidelberg (2003)
-
Itoh, K., Izu, T., Takenaka, M.: Address-differential power analysis of cryptographic scheme OK-ECDH and OK-ECDSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 129-143. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
35248873415
-
-
Itoh, K., Izu, T., Takenaka, M.: A practical countermeasure against address-bit differential power analysis. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 382-396. Springer, Heidelberg (2003)
-
Itoh, K., Izu, T., Takenaka, M.: A practical countermeasure against address-bit differential power analysis. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 382-396. Springer, Heidelberg (2003)
-
-
-
-
9
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
-
Roy, B, Okamoto, E, eds, INDOCRYPT 2000, Springer, Heidelberg
-
Okeya, K., Sakurai, K.: Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 178-190. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
10
-
-
35248816371
-
-
Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 199-210. Springer, Heidelberg (2002)
-
Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199-210. Springer, Heidelberg (2002)
-
-
-
-
11
-
-
0005243827
-
-
98-05, Univ. of Waterloo
-
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement at Technical Report CORR 98-05, Univ. of Waterloo (1998)
-
(1998)
An efficient protocol for authenticated key agreement at Technical Report CORR
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
12
-
-
0142156711
-
-
Ciet, M., Joye, M. (Vertually)Free randomization technique for elliptic curve cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, 2836, pp. 348-359. Springer, Heidelberg (2003)
-
Ciet, M., Joye, M. (Vertually)Free randomization technique for elliptic curve cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 348-359. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
84944884283
-
-
Joye, M., Quisquater, J.: Hessian elliptic curves and side-channel attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 402-410. Springer, Heidelberg (2001)
-
Joye, M., Quisquater, J.: Hessian elliptic curves and side-channel attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 402-410. Springer, Heidelberg (2001)
-
-
-
-
14
-
-
84944901711
-
-
Joye, M., Tymen, C.: Protections against Differential Analysis for Elliptic Curve Cryptography. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 377-390. Springer, Heidelberg (2001)
-
Joye, M., Tymen, C.: Protections against Differential Analysis for Elliptic Curve Cryptography. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377-390. Springer, Heidelberg (2001)
-
-
-
-
15
-
-
84939573910
-
Differential power analysis
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
35248881073
-
-
Fouque, P., Valette, F.: The doubling attack- why upwards is better than downwards. In: D.Walter, C., Koç, Ç.K., Paar, C (eds.) CHES 2003. LNCS, 2779, pp. 269-280. Springer, Heidelberg (2003)
-
Fouque, P., Valette, F.: The doubling attack- why upwards is better than downwards. In: D.Walter, C., Koç, Ç.K., Paar, C (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
-
-
-
-
17
-
-
84944898712
-
-
Liardet, P., Smart, N.: Preventing SPA/DPA in ECC systems using the Jacobi form. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 391-401. Springer, Heidelberg (2001)
-
Liardet, P., Smart, N.: Preventing SPA/DPA in ECC systems using the Jacobi form. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 391-401. Springer, Heidelberg (2001)
-
-
-
-
18
-
-
33646183037
-
-
Yen, S., Lien, W., Moon, S., Ha, J.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 183-195. Springer, Heidelberg (2005)
-
Yen, S., Lien, W., Moon, S., Ha, J.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 183-195. Springer, Heidelberg (2005)
-
-
-
-
19
-
-
35248871165
-
-
Akishita, T., Takagi, T.: Zero-value point attacks on elliptic curve cryptosystem. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 218-233. Springer, Heidelberg (2003)
-
Akishita, T., Takagi, T.: Zero-value point attacks on elliptic curve cryptosystem. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 218-233. Springer, Heidelberg (2003)
-
-
-
|