-
4
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
3
-
Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious RAMs. J ACM 43(3):431-473
-
(1996)
J ACM
, vol.43
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
7
-
-
26444465110
-
A side-channel analysis resistant description of the AES S-box
-
Springer Berlin
-
Oswald E, Mangard S, Pramstaller N, Rijmen V (2005) A side-channel analysis resistant description of the AES S-box. In: Proceedings FSE 2005. Lecture notes in computer science, vol 3557. Springer, Berlin, pp 413-423
-
(2005)
Proceedings FSE 2005 Lecture Notes in Computer Science
, vol.3557
, pp. 413-423
-
-
Oswald, E.1
Mangard, S.2
Pramstaller, N.3
Rijmen, V.4
-
8
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Springer Berlin
-
Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO'96: proceedings of the 16th annual international cryptology conference on advances in cryptology. Lecture notes in computer science, vol 1109. Springer, Berlin, pp 104-113
-
(1996)
CRYPTO'96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
9
-
-
84939573910
-
Differential power analysis
-
Springer Berlin
-
Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: CRYPTO'99: proceedings of the 19th annual international cryptology conference on advances in cryptology. Lecture notes in computer science, vol 1666. Springer, Berlin, pp 388-397
-
(1999)
CRYPTO'99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
10
-
-
3042641393
-
On the importance of checking cryptographic protocols for faults
-
2
-
Boneh D, DeMillo R, Lipton R (2001) On the importance of checking cryptographic protocols for faults. J Cryptol 14(2):101-119
-
(2001)
J Cryptol
, vol.14
, pp. 101-119
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
11
-
-
84956981493
-
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
-
Springer Berlin
-
Bao F, Deng RH, Han Y, Jeng AB, Narasimhalu AD, Ngair T-H (1998) Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In: Christianson B, Crispo B, Lomas TM, Roe MR (eds) Proceedings of the 5th international workshop on security protocols. Lecture notes in computer science, vol 1361. Springer, Berlin, pp 115-124
-
(1998)
Proceedings of the 5th International Workshop on Security Protocols Lecture Notes in Computer Science
, vol.1361
, pp. 115-124
-
-
Bao, F.1
Deng, R.H.2
Han, Y.3
Jeng, A.B.4
Narasimhalu, A.D.5
Ngair, T.-H.6
Christianson, B.7
Crispo, B.8
Lomas, T.M.9
Roe, M.R.10
-
14
-
-
0036290538
-
Timekeeping in the memory system: Predicting and optimizing memory behavior
-
Anchorage, Alaska, May 2002
-
Hu Z, Kaxiras S, Martonosi M (2002) Timekeeping in the memory system: predicting and optimizing memory behavior. In: Proceedings of the 29th annual international symposium on computer architecture (ISCA), Anchorage, Alaska, May 2002, pp 209-220
-
(2002)
Proceedings of the 29th Annual International Symposium on Computer Architecture (ISCA)
, pp. 209-220
-
-
Hu, Z.1
Kaxiras, S.2
Martonosi, M.3
|