-
1
-
-
0002380073
-
-
Oakland, California, November 18–21, USENIX Association
-
Anderson, R., Kuhn, M.G.: Tamper Resistance - a Cautionary Note. Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, California, November 18–21, USENIX Association (1996) 1–11
-
(1996)
Tamper Resistance - A Cautionary Note. Proceedings of the Second USENIX Workshop on Electronic Commerce
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.G.2
-
2
-
-
0002111043
-
-
Chicago, Illinois, May 10–11, USENIX Association
-
Kömmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. Proceedings of the USENIX Workshop on Smartcard Technology - Smartcard’99, Chicago, Illinois, May 10–11, USENIX Association (1999) 9–20
-
(1999)
Design Principles for Tamper-Resistant Smartcard Processors. Proceedings of the USENIX Workshop on Smartcard Technology - Smartcard’99
, pp. 9-20
-
-
Kömmerling, O.1
Kuhn, M.G.2
-
3
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R.L., Shamir, A., Adleman L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2) (1978) 120–126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
4
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Kaliski, B.S. (ed.), Springer-Verlag, Berlin Heidelberg New York
-
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski, B.S. (ed.): Advances in Cryptology - Crypto’97. Lecture Notes in Computer Science, Vol. 1294. Springer-Verlag, Berlin Heidelberg New York (1997) 513–525
-
(1997)
Advances in Cryptology - Crypto’97. Lecture Notes in Computer Science
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
0040320732
-
Breaking Public Key Cryptosystems in the Presence of Transient Faults
-
Christianson, B., et al. (eds.), Springer-Verlag, Berlin Heidelberg New York
-
Bao, F., et al.: Breaking Public Key Cryptosystems in the Presence of Transient Faults. In: Christianson, B., et al. (eds.): Security Protocols. Lecture Notes in Computer Science, Vol. 1361. Springer-Verlag, Berlin Heidelberg New York (1997) 115–124
-
(1997)
Security Protocols. Lecture Notes in Computer Science
, vol.1361
, pp. 115-124
-
-
Bao, F.1
-
6
-
-
84943632039
-
Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS and Other Systems
-
Koblitz, N. (ed.), Springer-Verlag, Berlin Heidelberg New York
-
Kocher, P.: Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS and Other Systems. In: Koblitz, N. (ed.): Advances in Cryptology - Crypto’96. Lecture Notes in Computer Science, Vol. 1109. Springer-Verlag, Berlin Heidelberg New York (1996) 104–113
-
(1996)
Advances in Cryptology - Crypto’96. Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
7
-
-
0001368523
-
-
Chicago, Illinois, May 10–11, USENIX Association
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigation of Power Analysis Attacks on Smartcards. Proceedings of the USENIX Workshop on Smartcard Technology - Smartcard’99, Chicago, Illinois, May 10–11, USENIX Association (1999) 151–161
-
(1999)
Investigation of Power Analysis Attacks on Smartcards. Proceedings of the USENIX Workshop on Smartcard Technology - Smartcard’99
, pp. 151-161
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
8
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.), Springer-Verlag, Berlin Heidelberg New York
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.): Advances in Cryptology - Crypto’99. Lecture Notes in Computer Science, Vol. 1666. Springer-Verlag, Berlin Heidelberg New York (1999) 388–397
-
(1999)
Advances in Cryptology - Crypto’99. Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
9
-
-
84942593174
-
IPA: A New Class of Power Attacks
-
Koc, C.K., Paar, C. (eds.), Springer-Verlag, Berlin Heidelberg New York
-
Fahn, P.N., Pearson, P.K.: IPA: A New Class of Power Attacks. In: Koc, C.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES’99. Lecture Notes in Computer Science, Vol. 1717. Springer-Verlag, Berlin Heidelberg New York (1999) 173–186
-
(1999)
Cryptographic Hardware and Embedded Systems - CHES’99. Lecture Notes in Computer Science
, vol.1717
, pp. 173-186
-
-
Fahn, P.N.1
Pearson, P.K.2
|