-
1
-
-
84956981493
-
-
F. Bao, R. H. Deng, Y. Han, A. B. Ieng, A. D. Narasimhalu, and T.-H. Ngair. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. In B. Christiansen, B. Crispo, T. M. A. Lomas, and M. Roe, editors, Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings, 1361 of Lecture Notes in Computer Science, pages 115-124. Springer, 1998.
-
F. Bao, R. H. Deng, Y. Han, A. B. Ieng, A. D. Narasimhalu, and T.-H. Ngair. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. In B. Christiansen, B. Crispo, T. M. A. Lomas, and M. Roe, editors, Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings, volume 1361 of Lecture Notes in Computer Science, pages 115-124. Springer, 1998.
-
-
-
-
2
-
-
84958641478
-
-
E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97,17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, 1294 of Lecture Notes in Computer Science, pages 513-525. Springer, 1997.
-
E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97,17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, volume 1294 of Lecture Notes in Computer Science, pages 513-525. Springer, 1997.
-
-
-
-
3
-
-
84957355967
-
-
D. Boneh, R. A. DeMillo, and R. I. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings, 1233 of Lecture Notes in Computer Science, pages 37-51. Springer, 1997.
-
D. Boneh, R. A. DeMillo, and R. I. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer, 1997.
-
-
-
-
4
-
-
33845191171
-
-
M. Boreale. Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. In L. Breveglieri, I. Koren, D. Naccache, and I.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, 4236 of Lecture Notes in Computer Science, pages 24-35. Springer, October 2006.
-
M. Boreale. Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. In L. Breveglieri, I. Koren, D. Naccache, and I.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, volume 4236 of Lecture Notes in Computer Science, pages 24-35. Springer, October 2006.
-
-
-
-
5
-
-
0030172012
-
Analyzing and Comparing Montgomery Multiplication Algorithms
-
26-33, lune
-
Çetin Kaya Koç, T. Acar, and B. S. K. Jr. Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro, 16(3):26-33, lune 1996.
-
(1996)
IEEE Micro
, vol.16
, Issue.3
-
-
Kaya Koç, C.1
Acar, T.2
Kaliski Jr., B.S.3
-
6
-
-
84949230268
-
-
M. Joye, J.-S. Quisquater, F. Bao, and R. H. Deng. RSA-type Signatures in the Presence of Transient Faults. In M. Darnell, editor, Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings, 1355 of Lecture Notes in Computer Science, pages 155-160. Springer, 1997.
-
M. Joye, J.-S. Quisquater, F. Bao, and R. H. Deng. RSA-type Signatures in the Presence of Transient Faults. In M. Darnell, editor, Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings, volume 1355 of Lecture Notes in Computer Science, pages 155-160. Springer, 1997.
-
-
-
-
7
-
-
37149005270
-
-
C. H. Kim and J.-J. Quisquater. Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. In D. Sauveron, C. Markantonakis, A. Bilas, and J.-J. Quisquater, editors, Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings., 4462 of Lecture Notes in Computer Science, pages 215-228. Springer, 2007.
-
C. H. Kim and J.-J. Quisquater. Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. In D. Sauveron, C. Markantonakis, A. Bilas, and J.-J. Quisquater, editors, Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings., volume 4462 of Lecture Notes in Computer Science, pages 215-228. Springer, 2007.
-
-
-
-
8
-
-
84943632039
-
-
P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In N. Koblitz, editor, Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, number 1109 in Lecture Notes in Computer Science, pages 104-113. Springer, 1996.
-
P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In N. Koblitz, editor, Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, number 1109 in Lecture Notes in Computer Science, pages 104-113. Springer, 1996.
-
-
-
-
10
-
-
35248868073
-
-
CRC Press, ISBN 0-8493-8523-7, Available online at
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. Series on Discrete Mathematics and its Applications. CRC Press, 1997. ISBN 0-8493-8523-7, Available online at http://www.caer.math. uwaterloo.ca/hac/.
-
(1997)
Series on Discrete Mathematics and its Applications, Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
11
-
-
84949514743
-
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Çetin Kaya Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES'99, First International Workshop, Worcester, MA, USA, August 12-13, 1999, Proceedings, 1717 of Lecture Notes in Computer Science, pages 144-157. Springer, 1999.
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Çetin Kaya Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES'99, First International Workshop, Worcester, MA, USA, August 12-13, 1999, Proceedings, volume 1717 of Lecture Notes in Computer Science, pages 144-157. Springer, 1999.
-
-
-
-
12
-
-
0017930809
-
-
R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):.120-126, February 1978. ISSN 0001-0782.
-
R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):.120-126, February 1978. ISSN 0001-0782.
-
-
-
|