-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
4
-
-
84874800178
-
A Public Key Cryptosystem and A Signature Based on Discrete Logarims
-
ElGamal, T.: A Public Key Cryptosystem and A Signature Based on Discrete Logarims. IEEE Transactions on Information Theory (1985)
-
(1985)
IEEE Transactions on Information Theory
-
-
ElGamal, T.1
-
6
-
-
0142051871
-
Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P.W.: Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26(5), 1484-1509 (1997)
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
7
-
-
33745943619
-
Shor's discrete logarithm quantum algorithm for elliptic curves, Technical Report
-
quant-ph/0301141, arXiv
-
Proos, J., Zalka, C.: Shor's discrete logarithm quantum algorithm for elliptic curves, Technical Report quant-ph/0301141, arXiv (2006)
-
(2006)
-
-
Proos, J.1
Zalka, C.2
-
9
-
-
85007027185
-
CMSS-An Improved Merkle Signature Scheme
-
Buchmann, J., Garcia, L., Dahmen, E., Doering, M., Klintsevich, E.: CMSS-An Improved Merkle Signature Scheme. In: 7th International Conference on Cryptology in India-Indocrypt, vol. 6, pp. 349-363 (2006)
-
(2006)
7th International Conference on Cryptology in India-Indocrypt
, vol.6
, pp. 349-363
-
-
Buchmann, J.1
Garcia, L.2
Dahmen, E.3
Doering, M.4
Klintsevich, E.5
-
10
-
-
56749148570
-
-
McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. DSN progress report 42-44, 114-116 (1978)
-
McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. DSN progress report 42-44, 114-116 (1978)
-
-
-
-
11
-
-
56749146472
-
-
Korbara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems -conversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992. Springer, Heidelberg (2001)
-
Korbara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems -conversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992. Springer, Heidelberg (2001)
-
-
-
-
12
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
13
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp. 104-113 (1996)
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS. vol. 1666. pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
-
15
-
-
33750825939
-
Cryptanalysis of Block Ciphers Implemented on Computers with Cache
-
Tsunoo, Y., Tsujihara, E., Minematsu, K., Miyauchi, H.: Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In: International Symposium on Information Theory and Applications, pp. 803-806 (2002)
-
(2002)
International Symposium on Information Theory and Applications
, pp. 803-806
-
-
Tsunoo, Y.1
Tsujihara, E.2
Minematsu, K.3
Miyauchi, H.4
-
16
-
-
27244432445
-
-
Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao. J.R., Sunar. B. (eds.) CHES 2005. LNCS, 3659, pp. 30-46. Springer, Heidelberg (2005)
-
Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao. J.R., Sunar. B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30-46. Springer, Heidelberg (2005)
-
-
-
-
20
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH-codes of length 511
-
Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH-codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
21
-
-
56749098577
-
-
Pointcheval. D.: Chosen-chipertext security for anyone-way cryptosystem. In: Imai, H., Zheng. Y. (eds.) PKC 2000. LNCS, 1751, pp. 129-146. Springer, Heidelberg (2000)
-
Pointcheval. D.: Chosen-chipertext security for anyone-way cryptosystem. In: Imai, H., Zheng. Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 129-146. Springer, Heidelberg (2000)
-
-
-
-
23
-
-
56749125387
-
-
Schindler, W., Aciiçmez, O.: A Vulnerability in RSA Implementations due to Instruction Cache Analysis and its Demonstration on OpenSSL. In: Malkin, T. (ed.) CT-RSA 2008. LNCS. 4964, Springer, Heidelberg (2008)
-
Schindler, W., Aciiçmez, O.: A Vulnerability in RSA Implementations due to Instruction Cache Analysis and its Demonstration on OpenSSL. In: Malkin, T. (ed.) CT-RSA 2008. LNCS. vol. 4964, Springer, Heidelberg (2008)
-
-
-
-
24
-
-
56749172810
-
-
Aciiçmez, O., Seifert, J.P., Koç. Ç.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377. Springer, Heidelberg (2007)
-
Aciiçmez, O., Seifert, J.P., Koç. Ç.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377. Springer, Heidelberg (2007)
-
-
-
|