-
1
-
-
33745805198
-
Power analysis to ECC using differential power between multiplication and squaring
-
Domingo-Ferrer, J, Posegga, J, Schreckling, D, eds, CARDIS 2006, Springer, Heidelberg
-
Akishita, T., Takagi, T.: Power analysis to ECC using differential power between multiplication and squaring. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 151-164. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3928
, pp. 151-164
-
-
Akishita, T.1
Takagi, T.2
-
2
-
-
38549098459
-
-
Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, 4876, pp. 110-125. Springer, Heidelberg (2007)
-
Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 110-125. Springer, Heidelberg (2007)
-
-
-
-
3
-
-
70350628754
-
-
ARM
-
ARM. SecurCore family, http://www.arm.com/products/CPUs/families/ SecurCoreFamily.html
-
SecurCore family
-
-
-
4
-
-
23044441343
-
-
Taylor & Francis Ltd, Abington
-
Avanzi, R.-M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Verkauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Taylor & Francis Ltd, Abington (2008)
-
(2008)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
-
Avanzi, R.-M.1
Cohen, H.2
Doche, C.3
Frey, G.4
Lange, T.5
Nguyen, K.6
Verkauteren, F.7
-
5
-
-
85034497704
-
Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Barrett, P.: Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311-323. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 311-323
-
-
Barrett, P.1
-
6
-
-
38049042605
-
Advances in Elliptic Curve Cryptography
-
Cambridge University Press, London Mathematical Society
-
Blake, I., Seroussi, G., Smart, N.: Advances in Elliptic Curve Cryptography. Lecture Note Series, vol. 317. Cambridge University Press, London Mathematical Society (2005)
-
(2005)
Lecture Note Series
, vol.317
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
-
7
-
-
84947735905
-
An attack on RSA given a small fraction of the private key bits
-
Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
-
Boneh, D., Durfee, G., Frankel, Y.: An attack on RSA given a small fraction of the private key bits. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 25-34. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 25-34
-
-
Boneh, D.1
Durfee, G.2
Frankel, Y.3
-
8
-
-
35048818034
-
-
Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 16-29. Springer, Heidelberg (2004)
-
Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
-
-
-
9
-
-
84958979095
-
-
Brier, É., Joye, M.: Weierstraß elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, 2274, pp. 335-345. Springer, Heidelberg (2002)
-
Brier, É., Joye, M.: Weierstraß elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 335-345. Springer, Heidelberg (2002)
-
-
-
-
10
-
-
3042527150
-
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
-
Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers 53(6), 760-768 (2004)
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 760-768
-
-
Chevallier-Mames, B.1
Ciet, M.2
Joye, M.3
-
11
-
-
84880293917
-
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
-
-
-
-
13
-
-
33750716484
-
-
Fouque, P.-A., Kunz-Jacques, S., Martinet, G., Muller, F., Valette, F.: Power attack on small RSA public exponent. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 339-353. Springer, Heidelberg (2006)
-
Fouque, P.-A., Kunz-Jacques, S., Martinet, G., Muller, F., Valette, F.: Power attack on small RSA public exponent. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 339-353. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
35248881073
-
-
Fouque, P.-A., Valette, F.: The doubling attack - why upwards is better than downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 269-280. Springer, Heidelberg (2003)
-
Fouque, P.-A., Valette, F.: The doubling attack - why upwards is better than downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
0242286594
-
Computing the distribution of the product of two continuous random variables
-
Glen, A.G., Leemis, L.M., Drew, J.H.: Computing the distribution of the product of two continuous random variables. Computaional Satatistics and Data Analysis 44(3), 451-464 (2004)
-
(2004)
Computaional Satatistics and Data Analysis
, vol.44
, Issue.3
, pp. 451-464
-
-
Glen, A.G.1
Leemis, L.M.2
Drew, J.H.3
-
16
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
17
-
-
84939573910
-
Differential power analysis
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
18
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
19
-
-
84949514743
-
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 144-157. Springer, Heidelberg (1999)
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144-157. Springer, Heidelberg (1999)
-
-
-
-
20
-
-
84941154719
-
-
MIPS-Technologies
-
MIPS-Technologies. SmartMIPS ASE, http://www.mips.com/content/Products/
-
SmartMIPS ASE
-
-
-
21
-
-
84966243285
-
Modular multiplication without trial division
-
Montgomery, P.: Modular multiplication without trial division. Mathematics of Computation 44, 519-521 (1985)
-
(1985)
Mathematics of Computation
, vol.44
, pp. 519-521
-
-
Montgomery, P.1
-
22
-
-
0003508562
-
-
National Institute of Standards and Technology, DSS, FIPS-186-2
-
National Institute of Standards and Technology. Digital signature standard (DSS), FIPS-186-2 (2000)
-
(2000)
Digital signature standard
-
-
-
23
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.M.: Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
33750740079
-
-
Stebila, D., Thériault, N.: Unified point addition formulæ and side-channel attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 354-368. Springer, Heidelberg (2006)
-
Stebila, D., Thériault, N.: Unified point addition formulæ and side-channel attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 354-368. Springer, Heidelberg (2006)
-
-
-
-
25
-
-
0033204468
-
Montgomery exponentiation needs no final subtractions
-
Walter, C.D.: Montgomery exponentiation needs no final subtractions. Electronic Letters 35(21), 1831-1832 (1999)
-
(1999)
Electronic Letters
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Walter, C.D.1
-
26
-
-
84949504956
-
-
Walter, C.D.: Montgomery's multiplication technique: How to make it smaller and faster. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 80-93. Springer, Heidelberg (1999)
-
Walter, C.D.: Montgomery's multiplication technique: How to make it smaller and faster. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 80-93. Springer, Heidelberg (1999)
-
-
-
-
27
-
-
84944888189
-
-
Walter, C.D.: Sliding windows succumbs to big mac attack. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 286-299. Springer, Heidelberg (2001)
-
Walter, C.D.: Sliding windows succumbs to big mac attack. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 286-299. Springer, Heidelberg (2001)
-
-
-
-
28
-
-
35048869588
-
-
Walter, C.D.: Longer keys may facilitate side channel attacks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 42-57. Springer, Heidelberg (2004)
-
Walter, C.D.: Longer keys may facilitate side channel attacks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 42-57. Springer, Heidelberg (2004)
-
-
-
-
29
-
-
27944441030
-
Data dependent power use in multipliers
-
Montuschi, P, Shwarz, E, eds, IEEE, Los Alamitos
-
Walter, C.D., Samyde, D.: Data dependent power use in multipliers. In: Montuschi, P., Shwarz, E. (eds.) 17th Symposium on Computer Arithmetic (ARITH), pp. 4-12. IEEE, Los Alamitos (2005)
-
(2005)
17th Symposium on Computer Arithmetic (ARITH)
, pp. 4-12
-
-
Walter, C.D.1
Samyde, D.2
-
30
-
-
33646183037
-
-
Yen, S.-M., Lien, W.-C., Moon, S.-J., Ha, J.C.: Power analysis by exploiting chosen message and internal collisions - vulnerability of checking mechanism for RSA-decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 183-195. Springer, Heidelberg (2005)
-
Yen, S.-M., Lien, W.-C., Moon, S.-J., Ha, J.C.: Power analysis by exploiting chosen message and internal collisions - vulnerability of checking mechanism for RSA-decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 183-195. Springer, Heidelberg (2005)
-
-
-
|