-
1
-
-
84983134283
-
Differential Fault Attacks on Elliptic Curve Cryptosystems
-
Springer-Verlag, editor, CRYPTO
-
I. Biehl, B. Meyer, and V. Müller. Differential Fault Attacks on Elliptic Curve Cryptosystems. In Springer-Verlag, editor, CRYPTO, LNCS, pages 131-146, 2000.
-
(2000)
LNCS
, pp. 131-146
-
-
Biehl, I.1
Meyer, B.2
Müller, V.3
-
2
-
-
33845275817
-
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
-
Springer-Verlag, editor, FDTC '06
-
J. Blömer, M. Otto, and J-P. Seifert. Sign Change Fault Attacks on Elliptic Curve Cryptosystems. In Springer-Verlag, editor, FDTC '06, LNCS, pages 36-52, 2006.
-
(2006)
LNCS
, pp. 36-52
-
-
Blömer, J.1
Otto, M.2
Seifert, J.-P.3
-
3
-
-
3042641393
-
On the Importance of Eliminating Errors in Cryptographic Computations
-
D. Boneh, R.A. DeMillo, and R.J. Lipton. On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptology, 14(2):101-119, 2001.
-
(2001)
J. Cryptology
, vol.14
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
4
-
-
84958760024
-
Elliptic Curve Based Password Authenticated Key Exchange Protocols
-
Springer-Verlag, editor, ACISP '01
-
C. Boyd, P. Montague, and K. Nguyen. Elliptic Curve Based Password Authenticated Key Exchange Protocols. In Springer-Verlag, editor, ACISP '01, LNCS, pages 487-501, 2001.
-
(2001)
LNCS
, pp. 487-501
-
-
Boyd, C.1
Montague, P.2
Nguyen, K.3
-
5
-
-
33750696616
-
Why One Should Also Secure RSA Public Key Elements
-
Springer-Verlag, editor, CHES '06
-
E. Brier, B. Chevallier-Mames, M. Ciet, and C. Clavier. Why One Should Also Secure RSA Public Key Elements. In Springer-Verlag, editor, CHES '06, LNCS, pages 324-338, 2006.
-
(2006)
LNCS
, pp. 324-338
-
-
Brier, E.1
Chevallier-Mames, B.2
Ciet, M.3
Clavier, C.4
-
6
-
-
33745812321
-
The Twist-AUgmented Technique for Key Exchange
-
Springer-Verlag, editor, PKC '06
-
O. Chevassut, P.-A. Fouque, P. Gaudry, and D. Pointcheval. The Twist-AUgmented Technique for Key Exchange. In Springer-Verlag, editor, PKC '06, LNCS, pages 410-426, 2006.
-
(2006)
LNCS
, pp. 410-426
-
-
Chevassut, O.1
Fouque, P.-A.2
Gaudry, P.3
Pointcheval, D.4
-
7
-
-
18744405402
-
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
-
M. Ciet and M. Joye. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Des. Codes Cryptography, 36(1):33-43, 2005.
-
(2005)
Des. Codes Cryptography
, vol.36
, Issue.1
, pp. 33-43
-
-
Ciet, M.1
Joye, M.2
-
8
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Springer-Verlag, editor, CHES'99
-
J. S. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Springer-Verlag, editor, CHES'99, LNCS, pages 292-302, 1999.
-
(1999)
LNCS
, pp. 292-302
-
-
Coron, J.S.1
-
9
-
-
52949103508
-
Digital Signature Standard (DSS), appendix 6: "Recommended Elliptic Curves for Federal Government Use
-
Federal Information Processing Standards Publication FIPS 186-2, Technical report, NIST, January 27
-
Federal Information Processing Standards Publication FIPS 186-2. Digital Signature Standard (DSS), appendix 6: "Recommended Elliptic Curves for Federal Government Use". Technical report, NIST, January 27 2000.
-
(2000)
-
-
-
10
-
-
35248881073
-
The Doubling Attack - hy Upwards Is Better than Downwards
-
Springer-Verlag, editor, CHES'03
-
P. A. Fouque and F. Valette. The Doubling Attack - hy Upwards Is Better than Downwards. In Springer-Verlag, editor, CHES'03, LNCS, pages 269-280, 2003.
-
(2003)
LNCS
, pp. 269-280
-
-
Fouque, P.A.1
Valette, F.2
-
11
-
-
35248816371
-
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
-
Springer-Verlag, editor, PKC'03
-
L. Goubin. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. In Springer-Verlag, editor, PKC'03, LNCS, pages 199-210, 2003.
-
(2003)
LNCS
, pp. 199-210
-
-
Goubin, L.1
-
12
-
-
84974665915
-
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
-
Springer-Verlag, editor, INDOCRYPT '02
-
T. Izu, B. Möller, and T. Takagi. Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. In Springer-Verlag, editor, INDOCRYPT '02, LNCS, pages 296-313, 2002.
-
(2002)
LNCS
, pp. 296-313
-
-
Izu, T.1
Möller, B.2
Takagi, T.3
-
13
-
-
35248874869
-
The Montgomery Powering Ladder
-
Springer-Verlag, editor, CHES'02
-
M. Joye and S. M. Yen. The Montgomery Powering Ladder. In Springer-Verlag, editor, CHES'02, LNCS, pages 291-302, 2002.
-
(2002)
LNCS
, pp. 291-302
-
-
Joye, M.1
Yen, S.M.2
-
14
-
-
0025790774
-
One-Way Permutations on Elliptic Curves
-
B. S. Kaliski. One-Way Permutations on Elliptic Curves. J. Cryptology, 3(3):187-199, 1991.
-
(1991)
J. Cryptology
, vol.3
, Issue.3
, pp. 187-199
-
-
Kaliski, B.S.1
-
16
-
-
35048902569
-
A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
-
ESORICS'04, of, Springer-Verlag
-
B. Möller. A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts. In ESORICS'04, volume 3193 of LNCS, pages 335-351. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3193
, pp. 335-351
-
-
Möller, B.1
-
17
-
-
84968484435
-
Speeding the Pollard and Elliptic Curve Methods of Factorization
-
jan
-
P. L. Montgomery. Speeding the Pollard and Elliptic Curve Methods of Factorization. Math. Comp, 48(177):243-264, jan 1987.
-
(1987)
Math. Comp
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
18
-
-
84919085619
-
An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance
-
january
-
S. C. Pohlig and M. E. Hellman. An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance. IEEE Transactions on Information Theory, IT-24(1): 106-110, january 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
19
-
-
84966238549
-
Monte Carlo Methods for Index Computation (mod p)
-
July
-
J. M. Pollard. Monte Carlo Methods for Index Computation (mod p). Mathematics of Computation, 32(143):918-924, July 1978.
-
(1978)
Mathematics of Computation
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
20
-
-
52949110380
-
-
J.H. Silverman. The arithmetic of elliptic curves, 106 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1986. Corrected reprint of the 1986 original.
-
J.H. Silverman. The arithmetic of elliptic curves, volume 106 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1986. Corrected reprint of the 1986 original.
-
-
-
-
21
-
-
1642319117
-
SEC 2: Recommended Elliptic Curve Domain Parameters
-
Standards for Efficient Cryptography Group SECG, Technical report, SECG, 2000
-
Standards for Efficient Cryptography Group (SECG). SEC 2: Recommended Elliptic Curve Domain Parameters. Technical report, SECG, 2000.
-
-
-
|