-
1
-
-
35048856922
-
Validation of Elliptic Curve Public Keys
-
Public Key Cryptography - PKC 2003
-
Antipa, A., Brown, D.R.L., Menezes, A., Struik, R., Vanstone, S.A.: Validation of Elliptic Curve Public Keys. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 211-223. Springer, Heidelberg (2002) (Pubitemid 36137139)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2567
, pp. 211-223
-
-
Antipa, A.1
Brown, D.2
Menezes, A.3
Struik, R.4
Vanstone, S.5
-
3
-
-
64249159739
-
Constructive and destructive use of compilers in elliptic curve cryptography
-
Barbosa, M., Moss, A., Page, D.: Constructive and destructive use of compilers in elliptic curve cryptography. J. Cryptology 22(2), 259-281 (2009)
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 259-281
-
-
Barbosa, M.1
Moss, A.2
Page, D.3
-
4
-
-
51849097235
-
Bug Attacks
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Biham, E., Carmeli, Y., Shamir, A.: Bug Attacks. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 221-240. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 221-240
-
-
Biham, E.1
Carmeli, Y.2
Shamir, A.3
-
5
-
-
18744405402
-
Elliptic curve cryptosystems in the presence of permanent and transient faults
-
Ciet, M., Joye, M.: Elliptic curve cryptosystems in the presence of permanent and transient faults. Designs, Codes and Cryptography 36(1), 33-43 (2005)
-
(2005)
Designs, Codes and Cryptography
, vol.36
, Issue.1
, pp. 33-43
-
-
Ciet, M.1
Joye, M.2
-
7
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
-
Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
8
-
-
24944448541
-
Simplify: A theorem prover for program checking
-
Detlefs, D., Nelson, G., Saxe, J.B.: Simplify: a theorem prover for program checking. J. ACM 52(3), 365-473 (2005)
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 365-473
-
-
Detlefs, D.1
Nelson, G.2
Saxe, J.B.3
-
9
-
-
35048862900
-
Multi-Prover Verification of C Programs
-
Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. Springer, Heidelberg
-
Filliâtre, J.-C., Marché, C.: Multi-Prover Verification of C Programs. In: Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. LNCS, vol. 3308, pp. 15-29. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3308
, pp. 15-29
-
-
Filliâtre, J.-C.1
Marché, C.2
-
10
-
-
36049022245
-
The Why/Krakatoa/Caduceus Platform for Deductive Program Verification
-
Damm, W., Hermanns, H. (eds.) CAV 2007. Springer, Heidelberg
-
Filliâtre, J.-C., Marché, C.: The Why/Krakatoa/Caduceus Platform for Deductive Program Verification. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 173-177. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4590
, pp. 173-177
-
-
Filliâtre, J.-C.1
Marché, C.2
-
11
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
Herley, C.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: New Security Paradigms Workshop (NSPW), pp. 133-144 (2009)
-
(2009)
New Security Paradigms Workshop (NSPW)
, pp. 133-144
-
-
Herley, C.1
-
12
-
-
84945708698
-
An axiomatic basis for computer programming
-
Hoare, C.A.R.: An axiomatic basis for computer programming. Communications of the ACM 12, 576-580 (1969)
-
(1969)
Communications of the ACM
, vol.12
, pp. 576-580
-
-
Hoare, C.A.R.1
-
13
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comp. 48(177), 243-264 (1987)
-
(1987)
Math. Comp.
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
14
-
-
35048881103
-
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Nguyen, P.Q.: Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 555-570. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 555-570
-
-
Nguyen, P.Q.1
-
15
-
-
33746067483
-
Cryptography in theory and practice: The case of encryption in IPsec
-
DOI 10.1007/11761679-2, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Paterson, K.G., Yau, A.K.L.: Cryptography in Theory and Practice: The Case of Encryption in IPsec. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 12-29. Springer, Heidelberg (2006) (Pubitemid 44072230)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 12-29
-
-
Paterson, K.G.1
Yau, A.K.L.2
-
17
-
-
0012584245
-
-
Technical Report CORR 99-39, Centre for Applied Cryptographic Research (CACR)
-
Solinas, J.A.: Generalized Mersenne numbers. Technical Report CORR 99-39, Centre for Applied Cryptographic Research (CACR), University of Waterloo (1999), http://www.cacr.math.uwaterloo.ca/techreports/1999/corr99-39.pdf
-
(1999)
Generalized Mersenne Numbers
-
-
Solinas, J.A.1
-
19
-
-
84857733780
-
A deductive verification platform for cryptographic software
-
Vieira, B., Barbosa, M., Sousa Pinto, J., Filliatre, J.-C.: A deductive verification platform for cryptographic software. In: International Workshop on Foundations and Techniques for Open Source Software Certification, OpenCert (2010)
-
International Workshop on Foundations and Techniques for Open Source Software Certification, OpenCert (2010)
-
-
Vieira, B.1
Barbosa, M.2
Sousa Pinto, J.3
Filliatre, J.-C.4
|