-
1
-
-
0038638945
-
Hardware Architectures for Public Key Cryptography
-
L. Batina, S.B. Örs, B. Preneel, and J. Vandewalle. Hardware Architectures for Public Key Cryptography. Elsevier Science Integration the VLSI Journal, 34(1-2):1-64, 2003.
-
(2003)
Elsevier Science Integration the VLSI Journal
, vol.34
, Issue.1-2
, pp. 1-64
-
-
Batina, L.1
Örs, S.B.2
Preneel, B.3
Vandewalle, J.4
-
2
-
-
0036289883
-
-
M. Bednara, M. Daldrup, J. Teich, J. von zur Gathen, and J. Shokrollahi. Tradeoff Analysis of FPGA Based Elliptic Curve Cryptosystems. In Proceedings of The IEEE International Symposium on Circuits and Systems (ISCAS), pages 797-800, Scottsdale, Arizona, USA, May 26-29 2002.
-
M. Bednara, M. Daldrup, J. Teich, J. von zur Gathen, and J. Shokrollahi. Tradeoff Analysis of FPGA Based Elliptic Curve Cryptosystems. In Proceedings of The IEEE International Symposium on Circuits and Systems (ISCAS), pages 797-800, Scottsdale, Arizona, USA, May 26-29 2002.
-
-
-
-
3
-
-
0035390239
-
High-radix Montgomery modular exponentiation on reconfigurable hardware
-
T. Blum and C. Paar. High-radix Montgomery modular exponentiation on reconfigurable hardware. IEEE Transactions on Computers, 50(7):759-764, 2001.
-
(2001)
IEEE Transactions on Computers
, vol.50
, Issue.7
, pp. 759-764
-
-
Blum, T.1
Paar, C.2
-
5
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
Ç. K. Koç and C. Paar, editors, Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems CHES, Worcester, Massachusetts, USA, August 12-13, Springer-Verlag
-
J.-S. Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In Ç. K. Koç and C. Paar, editors, Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 1717 in Lecture Notes in Computer Science, pages 292-302, Worcester, Massachusetts, USA, August 12-13 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, Issue.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
6
-
-
0035505389
-
An energy-efficient reconfigurable public-key cryptography processor
-
November
-
J. Goodman and A.P. Chandrakasan. An energy-efficient reconfigurable public-key cryptography processor. IEEE Journal of Solid-State Circuits, 36(11):1808-1820, November 2001.
-
(2001)
IEEE Journal of Solid-State Circuits
, vol.36
, Issue.11
, pp. 1808-1820
-
-
Goodman, J.1
Chandrakasan, A.P.2
-
7
-
-
84949500765
-
The Chinese remainder theorem and its application in a high-speed RSA crypto chip
-
New Orleans, Louisiana, USA, December 11-15, IEEE Computer Society Press
-
J. Grosschadl. The Chinese remainder theorem and its application in a high-speed RSA crypto chip. In Proceedings of the 16th Annual Computer Security Application Conference, pages 384-393, New Orleans, Louisiana, USA, December 11-15 2000. IEEE Computer Society Press.
-
(2000)
Proceedings of the 16th Annual Computer Security Application Conference
, pp. 384-393
-
-
Grosschadl, J.1
-
8
-
-
0008321437
-
Standard specifications for public key cryptography,
-
IEEE P1363
-
IEEE P1363. Standard specifications for public key cryptography, 1999.
-
(1999)
-
-
-
9
-
-
0000112683
-
Elliptic curve cryptosystem
-
N. Koblitz. Elliptic curve cryptosystem. Math. Comp., 48:203-209, 1987.
-
(1987)
Math. Comp
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
10
-
-
0004159566
-
-
Springer-Verlag, Berlin, Germany, second edition
-
N. Koblitz. A Course in Number Theory and Cryptography, volume 114 of Graduate text in mathematics. Springer-Verlag, Berlin, Germany, second edition, 1994.
-
(1994)
A Course in Number Theory and Cryptography, volume 114 of Graduate text in mathematics
-
-
Koblitz, N.1
-
12
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO, Santa Barbara, CA, USA, August 15-19, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO, number 1666 in Lecture Notes in Computer Science, pages 388-397, Santa Barbara, CA, USA, August 15-19 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, Issue.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
13
-
-
4143149431
-
Fast Montgomery Modular Multiplication and RSA Cryptographic Processor Architectures
-
November
-
C. McIvor, M. McLoone, J. McCanny, A. Daly, and W. Marnane. Fast Montgomery Modular Multiplication and RSA Cryptographic Processor Architectures. In Proceedings of 37th Annual Asilomar Conference on Signals, Systems and Computers, pages 379-384, November 2003.
-
(2003)
Proceedings of 37th Annual Asilomar Conference on Signals, Systems and Computers
, pp. 379-384
-
-
McIvor, C.1
McLoone, M.2
McCanny, J.3
Daly, A.4
Marnane, W.5
-
15
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
H. C. Williams, editor, Advances in Cryptology: Proceedings of CRYPTO, number in, Springer-Verlag
-
V. Miller. Uses of elliptic curves in cryptography. In H. C. Williams, editor, Advances in Cryptology: Proceedings of CRYPTO, number 218 in Lecture Notes in Computer Science, pages 417-426. Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
16
-
-
68549097842
-
m)
-
Ç.K. Koç and C. Paar, editors, Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems CHES, Springer-Verlag
-
m). In Ç.K. Koç and C. Paar, editors, Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES), number 1965 in Lecture Notes in Computer Science, pages 41-56. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, Issue.1965
, pp. 41-56
-
-
Orlando, G.1
Paar, C.2
-
17
-
-
35248847436
-
Power-analysis attacks on an FPGA - first experimental results
-
C. Walter, Ç. K. Koç, and C. Paar, editors, Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems CHES, number in, Cologne, Germany, September 7-10, Springer-Verlag
-
S. B. Ors, E. Oswald, and B. Preneel. Power-analysis attacks on an FPGA - first experimental results. In C. Walter, Ç. K. Koç, and C. Paar, editors, Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2779 in Lecture Notes in Computer Science, pages 35-50, Cologne, Germany, September 7-10 2003. Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2779
, pp. 35-50
-
-
Ors, S.B.1
Oswald, E.2
Preneel, B.3
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
21
-
-
0034846231
-
A quick safari through the reconfiguration jungle
-
Las Vegas, NV, USA, June 18-22
-
P. Schaumont, I. Verbauwhede, K. Keutzer, and M. Sarrafzadeh. A quick safari through the reconfiguration jungle. In Proceedings of 38th Design Automation Conference (DAC'01), pages 172-177, Las Vegas, NV, USA, June 18-22 2001.
-
(2001)
Proceedings of 38th Design Automation Conference (DAC'01)
, pp. 172-177
-
-
Schaumont, P.1
Verbauwhede, I.2
Keutzer, K.3
Sarrafzadeh, M.4
-
22
-
-
24744465637
-
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
-
M. Joye and J.-J. Quisquater, editors, Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems CHES, number in, Springer-Verlag
-
F.-X. Standaert, S. B. Ors, and B. Preneel. Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? In M. Joye and J.-J. Quisquater, editors, Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 3156 in Lecture Notes in Computer Science, page 3044. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 3044
-
-
Standaert, F.-X.1
Ors, S.B.2
Preneel, B.3
-
23
-
-
47749084572
-
-
m). In B.S. Kaliski Jr., Ç.Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2523 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
m). In B.S. Kaliski Jr., Ç.Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2523 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
-
-
|