-
1
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
W. Fumy (ed.), Springer, New York
-
D. Boneh, R.A. Demillo, R.J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults. In: W. Fumy (ed.): Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science, Vol. 1233. Springer, New York (1997) 37-51.
-
(1997)
Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
2
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptology 10 (no. 4) (1997) 233-260.
-
(1997)
J. Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
3
-
-
68549125506
-
A Practical Implementation of the Timing Attack
-
J.-J. Quisquater, B. Schneier (eds.), Université catholique de Louvain
-
J.-F. Dhern, F. Koeune, P.-A. Leroux, P.-A. Mestré, J.-J. Quisquater, J.-L. Willems: A Practical Implementation of the Timing Attack. In: J.-J. Quisquater, B. Schneier (eds.): CARDIS 1998, Third Smart Card Research and Advanced Application Conference (PreProceedings). Université catholique de Louvain (1998).
-
(1998)
CARDIS 1998, Third Smart Card Research and Advanced Application Conference (Preproceedings)
-
-
Dhern, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.-A.4
Quisquater, J.-J.5
Willems, J.-L.6
-
5
-
-
62749186184
-
Montgomery Exponentiation with no Final Subtractions: Improved Results
-
To appear in:Ç.K. Koç, C. Paar (eds.), Proceedings)
-
G. Hachez, J.-J. Quisquater: Montgomery Exponentiation with no Final Subtractions: Improved Results. To appear in: Ç.K. Koç, C. Paar (eds.): Workshop on Cryptographic Hardware and Embedded Systems, 2000 (Proceedings).
-
(2000)
Workshop on Cryptographic Hardware and Embedded Systems
-
-
Hachez, G.1
Quisquater, J.-J.2
-
6
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems
-
N. Koblitz (ed.), Springer, Heidelberg
-
P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In: N. Koblitz (ed.): Advances in Cryptology-Crypto '96, Lecture Notes in Computer Science, Vol. 1109. Springer, Heidelberg (1996), 104-113.
-
(1996)
Advances in Cryptology-Crypto '96, Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
8
-
-
84966243285
-
Modular Multiplication without Trial Division
-
P.L. Montgomery: Modular Multiplication without Trial Division. Math. Comp. 44 (no. 170) (1985) 519-521.
-
(1985)
Math. Comp
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
10
-
-
0033204468
-
Montgomery's Exponentiation Needs no Final Subtractions
-
C.D. Walter: Montgomery's Exponentiation Needs no Final Subtractions. Electronics letters 35 (no. 21) (1999), 1831-1832.
-
(1999)
Electronics Letters
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Walter, C.D.1
|