-
1
-
-
33745470162
-
-
August, Document number: ARM DDI 0029E
-
ARM. ARM 7TDMI Data Sheet, August 1995. Document number: ARM DDI 0029E.
-
(1995)
ARM 7TDMI Data Sheet
-
-
ARM1
-
3
-
-
85034497704
-
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor
-
A. M. Odlyzko, editor, Springer-Verlag
-
P. Barrett. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In A. M. Odlyzko, editor, Advances in Cryptology-CRYPTO ‘86, volume 263 of LNCS, pages 311-323. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology-Crypto ‘86, Volume 263 of LNCS
, pp. 311-323
-
-
Barrett, P.1
-
5
-
-
27544466109
-
A Practical Implementation of the Timing Attack
-
Springer-Verlag, to appear
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, and J.-L. Willems. A Practical Implementation of the Timing Attack. In CARDIS ‘98, LNCS. Springer-Verlag, 1998. to appear.
-
(1998)
CARDIS ‘98, LNCS
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestr, P.4
Équisquater, J.-J.5
Willems, J.-L.6
-
7
-
-
84954767265
-
Eldridge. A Faster Modular Multiplication Algorithm. Inter
-
Stephen E. Eldridge. A Faster Modular Multiplication Algorithm. Inter. J. Com-put. Math., 40:63-68, 1991.
-
(1991)
J. Com-Put. Math.
, vol.40
, pp. 63-68
-
-
Stephen, E.1
-
8
-
-
0027606916
-
Hardware Implementation of Montgomery’s Modular Multiplication Algorithm
-
Stephen E. Eldridge and Colin D. Walter. Hardware Implementation of Montgomery’s Modular Multiplication Algorithm. IEEE Transactions on Computers, 42(6):693-699, June 1993.
-
(1993)
IEEE Transactions on Computers
, vol.42
, Issue.6
, pp. 693-699
-
-
Eldridge, S.E.1
Walter, C.D.2
-
9
-
-
0038800541
-
Timing Attack: What Can Be Achieved by a Powerful Adversary?
-
A. Barbé, E.C. van der Meulen, and P. Vanroose, editors, pages 63-70, May
-
Gael Hachez, François Koeune, and Jean-Jacques Quisquater. Timing Attack: What Can Be Achieved by a Powerful Adversary? In A. Barbé, E.C. van der Meulen, and P. Vanroose, editors, The 20th symposium on Information Theory in the Benelux, pages 63-70, May 1999.
-
(1999)
The 20Th Symposium on Information Theory in the Benelux
-
-
Hachez, G.1
Koeune, F.2
Quisquater, J.-J.3
-
10
-
-
84949515158
-
Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201
-
In Cétin K. Koç and Christof Paar, editors, Springer-Verlag, August
-
Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, and Yasushi Kurihara. Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201. In Cétin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems-CHES ‘99, volume 1717 of LNCS, pages 61-72. Springer-Verlag, August 1999.
-
(1999)
Cryptographic Hardware and Embedded Systems-Ches ‘99, Volume 1717 of LNCS
, pp. 61-72
-
-
Itoh, K.1
Takenaka, M.2
Torii, N.3
Temma, S.4
Kurihara, Y.5
-
11
-
-
84943632039
-
Timing Attack on Implementations of Dié-Hellman, RSA, DSS and other systems
-
In Neil Kobliz, editor, Springer-Verlag, August
-
Paul Kocher. Timing Attack on Implementations of Dié-Hellman, RSA, DSS and other systems. In Neil Kobliz, editor, Advances in Cryptology-CRYPTO ‘96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, August 1996.
-
(1996)
Advances in Cryptology-Crypto ‘96, Volume 1109 of LNCS
, pp. 104-113
-
-
Kocher, P.1
-
12
-
-
0000474763
-
Diérential Power Analysis
-
M. Wiener, editor, Springer-Verlag, August
-
Paul Kocher, J. Jaé, and B. Jun. Diérential Power Analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO ‘99, volume 1666 of LNCS, pages 388-397. Springer-Verlag, August 1999.
-
(1999)
Advances in Cryptology-Crypto ‘99, Volume 1666 of LNCS
, pp. 388-397
-
-
Kocher, P.1
Jaé, J.2
Jun, B.3
-
13
-
-
84949514743
-
Power analysis Attack of Modular Exponentiation in Smartcards
-
Çetin K. Koç and Christof Paar, editors, Springer-Verlag, August
-
Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. Power analysis Attack of Modular Exponentiation in Smartcards. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems-CHES ‘99, volume 1717 of LNCS, pages 144-157. Springer-Verlag, August 1999.
-
(1999)
Cryptographic Hardware and Embedded Systems-Ches ‘99, Volume 1717 of LNCS
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
14
-
-
84966243285
-
Montgomery. Modular Multiplication Without Trial Division
-
Peter L. Montgomery. Modular Multiplication Without Trial Division. Mathemat-ics of Computation, 44(170):519-521, April 1985.
-
(1985)
Mathemat-Ics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Peter, L.1
-
15
-
-
84857742571
-
Procédé de Codage selon la Méthode dite RSA, par un Microcontr^oleur et Dispositifs Utilisant ce Procédé
-
February
-
Jean-Jacques Quisquater. Procédé de Codage selon la Méthode dite RSA, par un Microcontr^oleur et Dispositifs Utilisant ce Procédé. Demande de brevet français. (Dépôt numéro: 90 02274), February 1990.
-
(1990)
Demande De Brevet français. (Dépôt numéro: 90 02274)
-
-
Quisquater, J.-J.1
-
17
-
-
0033204468
-
Walter. Montgomery Exponentiation Needs no Final Subtractions
-
Colin D. Walter. Montgomery Exponentiation Needs no Final Subtractions. Electronics Letters, 35(21):1831-1832, October 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Colin, D.1
-
18
-
-
84949504956
-
Walter. Montgomery’s Multiplication Technique: How to Make It Smaller and Faster
-
In Cétin K. Koç and Christof Paar, editors, Springer-Verlag, August
-
Colin D. Walter. Montgomery’s Multiplication Technique: How to Make It Smaller and Faster. In Cétin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems-CHES ‘99, volume 1717 of LNCS, pages 80-93. Springer-Verlag, August 1999.
-
(1999)
Cryptographic Hardware and Embedded Systems-Ches ‘99, Volume 1717 of LNCS
, pp. 80-93
-
-
Colin, D.1
|