-
2
-
-
85027967075
-
-
Springer-Verla
-
E. Brickell, D. Gordon, K. McCurley, D. Wilson. Fast Exponentiation with Pre-computation (Extended Abstract), Advances in Cryptology - Eurocrypt '92, LNCS 658 (1993), Springer-Verlag, pp. 200-207.
-
(1993)
Fast Exponentiation with Pre-Computation (Extended Abstract), Advances in Cryptology - Eurocrypt '92, LNCS 658
, pp. 200-207
-
-
Brickell, E.1
Gordon, D.2
McCurley, K.3
Wilson, D.4
-
3
-
-
84949483512
-
-
Proceedings ofthe second AES Candidate Conference, Marc
-
S. Chari, C. Jutla, J.R. Rao, P. Rohatgi. A cautionary note regarding evaluation of AES candidates on smart-cards, Proceedings ofthe second AES Candidate Conference, March 1999, pp. 133-147.
-
(1999)
A Cautionary Note regarding Evaluation of AES Candidates on Smart-Cards
, pp. 133-147
-
-
Chari, S.1
Jutla, C.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
D. Chaum. Security without identification: transaction systems to make Big Brother obsolete, Communications ofthe ACM, vol. 28, n. 10, Oct 1985, pp. 1030-1044.
-
(1985)
Communications Ofthe ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
6
-
-
34248682000
-
Data encryption standard
-
U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virgini
-
FIPS 46, Data encryption standard, Federal Information Processing Standards Publication 46, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1977.
-
(1977)
Federal Information Processing Standards Publication
, vol.46
-
-
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Info. Theory, IT-31, 1985, pp 469-472.
-
(1985)
IEEE Trans. Info. Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
9
-
-
0000490812
-
A Survey of Fast Exponentiation Methods
-
D.M. Gordon. A Survey of Fast Exponentiation Methods, Journal of Algorithms 27, 129-146 (1998).
-
(1998)
Journal of Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.M.1
-
12
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz. Elliptic Curve Cryptosystems, Mathematics of Computation, vol. 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
84943632039
-
-
RSA, DSS and other systems, Advances in Cryptology, Proceedings of Crypto' 96, LNCS 1109,N. Koblitz, Ed., Springer-Verla
-
Paul Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems, Advances in Cryptology, Proceedings of Crypto' 96, LNCS 1109,N. Koblitz, Ed., Springer-Verlag, 1996, pp. 104-113.
-
(1996)
Timing Attacks on Implementations of Diffie-Hellman
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
84949519104
-
-
Paul Kocher, Joshua Jaffe, and Benjamin Jun, Introduction to Differential Power Analysis and Related Attacks, http://www.cryptography.com/dpa/technical, 1998.
-
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
84957354181
-
Speeding up elliptic cryptosystems by using a signed binary window method
-
92, LNCS 740, pp. 345-357, Springer-Verlag, Berlin/New-Yor
-
K. Koyama, Y. Tsuruoka, Speeding up elliptic cryptosystems by using a signed binary window method, Advances in Cryptology- Proceedings of Crypto '92, LNCS 740, pp. 345-357, Springer-Verlag, Berlin/New-York, 1993.
-
(1993)
Advances in Cryptology- Proceedings of Crypto
-
-
Koyama, K.1
Tsuruoka, Y.2
-
18
-
-
0000266095
-
Speeding up the computation of an elliptic curve using addition-subtraction chains
-
F. Morain, J. Olivos. Speeding up the computation of an elliptic curve using addition-subtraction chains, Inform. Theory Appl. 24 (1990), 531-543.
-
(1990)
Inform. Theory Appl
, vol.24
, pp. 531-543
-
-
Morain, F.1
Olivos, J.2
|