-
1
-
-
37149051633
-
How to prevent DPA and fault attacks in a unified way for ECC scalar multiplication: Ring extension method
-
E. Dawson and D. Wong, editors, Information Security Practice and Experience, ISPEC 2007, of, Springer-Verlag
-
Y.-J. Baek and I. Vasyltsov. How to prevent DPA and fault attacks in a unified way for ECC scalar multiplication: Ring extension method. In E. Dawson and D. Wong, editors, Information Security Practice and Experience - ISPEC 2007, volume 4464 of Lecture Notes in Computer Science, pages 225-237. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4464
, pp. 225-237
-
-
Baek, Y.-J.1
Vasyltsov, I.2
-
2
-
-
31344443130
-
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The sorcerer's apprentice guide to fault attacks. Proceedings the IEEE, 94(2):370-382, 2006. Earlier version in Proc. of FDTC 2004.
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The sorcerer's apprentice guide to fault attacks. Proceedings the IEEE, 94(2):370-382, 2006. Earlier version in Proc. of FDTC 2004.
-
-
-
-
4
-
-
84983134283
-
Differential fault analysis of elliptic curve cryptosystems
-
M. Bellare, editor, Advances in Cryptology, CRYPTO 2000, of, Springer-Verlag
-
I. Biehl, B. Meyer, and V. Müller. Differential fault analysis of elliptic curve cryptosystems. In M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 131-146. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 131-146
-
-
Biehl, I.1
Meyer, B.2
Müller, V.3
-
5
-
-
34547358080
-
Advances in Elliptic Curve Cryptography
-
I. F. Blake, G. Seroussi, and N. P. Smart, editors, of, Cambridge University Press
-
I. F. Blake, G. Seroussi, and N. P. Smart, editors. Advances in Elliptic Curve Cryptography, volume 317 of London Mathematical Society Lecture Note Series. Cambridge University Press, 2005.
-
(2005)
London Mathematical Society Lecture Note Series
, vol.317
-
-
-
6
-
-
33845275817
-
Sign change fault attacks on elliptic curve cryptosystems
-
L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography -FDTC 2006, of, Springer-Verlag
-
J. Blömer, M. Otto, and J.-P. Seifert. Sign change fault attacks on elliptic curve cryptosystems. In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography -FDTC 2006, volume 4236 of Lecture Notes in Computer Science, pages 36-52. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4236
, pp. 36-52
-
-
Blömer, J.1
Otto, M.2
Seifert, J.-P.3
-
7
-
-
3042641393
-
On the importance of eliminating errors in cryptographic computations
-
Extended abstract in Proc. of EUROCRYPT '97
-
D. Boneh, R. A. DeMillo, and R. J. Lipton. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology, 14(2): 110-119, 2001. Extended abstract in Proc. of EUROCRYPT '97.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.2
, pp. 110-119
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
8
-
-
18744405402
-
Elliptic curve cryptosystems in the presence of permanent and transient faults
-
M. Ciet and M. Joye. Elliptic curve cryptosystems in the presence of permanent and transient faults. Designs, Codes and Cryptography, 36(1):33-43, 2005.
-
(2005)
Designs, Codes and Cryptography
, vol.36
, Issue.1
, pp. 33-43
-
-
Ciet, M.1
Joye, M.2
-
9
-
-
23044441343
-
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
H. Cohen and G. Frey, editors, of, Chapman & Hall/CRC
-
H. Cohen and G. Frey, editors. Handbook of Elliptic and Hyperelliptic Curve Cryptography, volume 34 of Discrete Mathematics and Its Applications. Chapman & Hall/CRC, 2005.
-
(2005)
Discrete Mathematics and Its Applications
, vol.34
-
-
-
10
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems CHES '99, of, Springer-Verlag
-
J.-S. Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES '99), volume 1717 of Lecture Notes in Computer Science, pages 292-302. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
11
-
-
52949119768
-
-
FIPS PUB 186-2. Digital signature standard. Federal Information Processing Standard Publication 186-2, National Institute of Standards and Technology, Jan. 2000.
-
FIPS PUB 186-2. Digital signature standard. Federal Information Processing Standard Publication 186-2, National Institute of Standards and Technology, Jan. 2000.
-
-
-
-
12
-
-
84902496121
-
A survey on fault attacks
-
J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A. A. El Kalam, editors, Kluwer
-
C. Giraud and H. Thiebeauld. A survey on fault attacks. In J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A. A. El Kalam, editors, Smart Card Research and Advanced Applications VI(CARDIS 2004), pages 159-176. Kluwer, 2004.
-
(2004)
Smart Card Research and Advanced Applications VI(CARDIS 2004)
, pp. 159-176
-
-
Giraud, C.1
Thiebeauld, H.2
-
13
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
N. Koblitz, editor, Advances in Cryptology, CRYPTO '96, of, Springer-Verlag
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology - CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, Advances in Cryptology, CRYPTO '99, of, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
33646840584
-
Projective coordinates leak
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, of, Springer-Verlag
-
D. Naccache, N. P. Smart, and J. Stern. Projective coordinates leak. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 257-267. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 257-267
-
-
Naccache, D.1
Smart, N.P.2
Stern, J.3
-
17
-
-
47949098691
-
How to check modular exponentiation. Presented at the rump session of EUROCRYPT '97, Konstanz, Germany
-
May 13
-
A. Shamir. How to check modular exponentiation. Presented at the rump session of EUROCRYPT '97, Konstanz, Germany, May 13, 1997.
-
(1997)
-
-
Shamir, A.1
-
18
-
-
0003357475
-
The Arithmetic of Elliptic Curves
-
of, Springer-Verlag
-
J. H. Silverman. The Arithmetic of Elliptic Curves, volume 106 of Graduate Texts in Mathematics. Springer-Verlag, 1986.
-
(1986)
Graduate Texts in Mathematics
, vol.106
-
-
Silverman, J.H.1
|