-
1
-
-
35248899439
-
-
CHES 2003, LNCS 2779, Springer-Verlag
-
R. Avanzi, "Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems", CHES 2003, LNCS 2779, pp.366-381, Springer-Verlag, 2003.
-
(2003)
Countermeasures Against Differential Power Analysis For Hyperelliptic Curve Cryptosystems
, pp. 366-381
-
-
Avanzi, R.1
-
2
-
-
35248871165
-
Zero-value Point Attacks on Elliptic Curve Cryptosystem
-
LNCS 2851, Springer-Verlag
-
T. Akishita, and T. Takagi, "Zero-value Point Attacks on Elliptic Curve Cryptosystem", ISC 2003, LNCS 2851, pp.218-233, Springer-Verlag, 2003.
-
(2003)
ISC 2003
, pp. 218-233
-
-
Akishita, T.1
Takagi, T.2
-
3
-
-
23044482179
-
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
-
LNCS 2947, Springer-Verlag
-
T. Akishita, and T. Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny", PKC 2004, LNCS 2947, pp.346-359, Springer-Verlag, 2004.
-
(2004)
PKC 2004
, pp. 346-359
-
-
Akishita, T.1
Takagi, T.2
-
4
-
-
84958979095
-
Weierstraß Elliptic Curves and Side-Channel Attacks
-
LNCS 2274, Springer-Verlag
-
E. Brier, and M. Joye, "Weierstraß Elliptic Curves and Side-Channel Attacks", PKC 2002, LNCS 2274, pp.335-345, Springer-Verlag, 2002.
-
(2002)
PKC 2002
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
5
-
-
84880293917
-
-
CHES'99, LNCS 1717, Springer-Verlag
-
J. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystem", CHES'99, LNCS 1717, pp.292-302, Springer-Verlag, 1999.
-
(1999)
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystem"
, pp. 292-302
-
-
Coron, J.1
-
6
-
-
84944905303
-
Universal exponentiation algorithm - A first step towards provable SPA-resistance-
-
LNCS 2162, Springer-Verlag
-
C. Clavier, and M. Joye, "Universal exponentiation algorithm - A first step towards provable SPA-resistance-", CHES 2001, LNCS 2162, pp. 300-308, Springer-Verlag, 2001.
-
(2001)
CHES 2001
, pp. 300-308
-
-
Clavier, C.1
Joye, M.2
-
7
-
-
0142156711
-
Virtually Free Randomization Technique for Elliptic Curve Cryptography
-
LNCS 2836, Springer-Verlag
-
M. Ciet, and M. Joye, "(Virtually) Free Randomization Technique for Elliptic Curve Cryptography", ICICS 2003, LNCS 2836, pp. 348-359, Springer-Verlag, 2003.
-
(2003)
ICICS 2003
, pp. 348-359
-
-
Ciet, M.1
Joye, M.2
-
8
-
-
84947743704
-
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
-
LNCS 1514, Springer-Verlag
-
H. Cohen, A. Miyaji, and T. Ono, "Efficient Elliptic Curve Exponentiation Using Mixed Coordinates", Asiacrypt'98, LNCS 1514, pp.51-65, Springer-Verlag, 1998.
-
(1998)
Asiacrypt'98
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
9
-
-
35248816371
-
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
-
LNCS 2567, Springer-Verlag
-
L. Goubin, "A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems", PKC 2003, LNCS 2567, pp.199-210, Springer-Verlag, 2003.
-
(2003)
PKC 2003
, pp. 199-210
-
-
Goubin, L.1
-
10
-
-
35248898400
-
Address-bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA
-
LNCS 2523
-
K. Itoh, T. Izu, M. Takenaka, "Address-bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA", CHES 2002, LNCS 2523, pp.129-143,2003.
-
(2003)
CHES 2002
, pp. 129-143
-
-
Itoh, K.1
Izu, T.2
Takenaka, M.3
-
11
-
-
84974665915
-
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
-
LNCS 2551, Springer-Verlag
-
T. Izu, B. Möller, and T. Takagi, "Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks", Indocrypt 2002, LNCS 2551, pp.296-313, Springer-Verlag, 2002.
-
(2002)
Indocrypt 2002
, pp. 296-313
-
-
Izu, T.1
Möller, B.2
Takagi, T.3
-
12
-
-
84958955271
-
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
-
LNCS 2274, Springer-Verlag
-
T. Izu, and T. Takagi, "A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks", PKC 2002, LNCS 2274, pp.280-296, Springer-Verlag, 2002.
-
(2002)
PKC 2002
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
13
-
-
84949515158
-
Fast Implementation of Public-Key Cryptography on DSP TMS320C6201
-
LNCS 1717
-
K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara, "Fast Implementation of Public-Key Cryptography on DSP TMS320C6201", CHES'99, LNCS 1717, pp.61-72,1999.
-
(1999)
CHES'99
, pp. 61-72
-
-
Itoh, K.1
Takenaka, M.2
Torii, N.3
Temma, S.4
Kurihara, Y.5
-
14
-
-
35248818852
-
DPA Countermeasures by Improving the Window Method
-
LNCS 2523, Springer-Verlag
-
K. Itoh, J. Yajima, M. Takenaka, and N. Torii, "DPA Countermeasures by Improving the Window Method", CHES 2002, LNCS 2523, pp.303-317, Springer-Verlag, 2003.
-
(2003)
CHES 2002
, pp. 303-317
-
-
Itoh, K.1
Yajima, J.2
Takenaka, M.3
Torii, N.4
-
15
-
-
84944901711
-
Protections against Differential Analysis for Elliptic Curve Cryptography
-
Springer-Verlag, LNCS 2162
-
M. Joye, C. Tymen, "Protections against Differential Analysis for Elliptic Curve Cryptography", CHES 2001, LNCS 2162, pp.377-390, Springer-Verlag, 2001.
-
(2001)
CHES 2001
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
16
-
-
35248874869
-
The Montgomery Powering Ladder
-
LNCS 2523, Springer-Verlag
-
M. Joye, and S-M. Yen, "The Montgomery Powering Ladder", CHES 2002, LNCS 2523, pp.291-302, Springer-Verlag, 2003.
-
(2003)
CHES 2002
, pp. 291-302
-
-
Joye, M.1
Yen, S.-M.2
-
17
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
LNCS 1109, Springer-Verlag
-
C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", Crypto'96, LNCS 1109,pp.104-113, Springer-Verlag, 1996.
-
(1996)
Crypto'96
, pp. 104-113
-
-
Kocher, C.1
-
18
-
-
84939573910
-
Differential Power Analysis
-
LNCS 1666, Springer-Verlag
-
C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", Crypto'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
-
(1999)
Crypto'99
, pp. 388-397
-
-
Kocher, C.1
Jaffe, J.2
Jun, B.3
-
19
-
-
84947262754
-
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
-
LNCS 2200, Springer-Verlag
-
B. Möller, "Securing Elliptic Curve Point Multiplication against Side-Channel Attacks", ISC 2001, LNCS 2200, pp.324-334, Springer-Verlag, 2001.
-
(2001)
ISC 2001
, pp. 324-334
-
-
Möller, B.1
-
20
-
-
84945249400
-
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
-
LNCS 2433, Springer-Verlag
-
B. Möller, "Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks", ISC 2002, LNCS 2433, pp.402-413, Springer-Verlag, 2002.
-
(2002)
ISC 2002
, pp. 402-413
-
-
Möller, B.1
-
21
-
-
84968484435
-
Speeding the Pollard and Elliptic Curve Methods for Factorizations
-
P. Montgomery, "Speeding the Pollard and Elliptic Curve Methods for Factorizations", Math. of Comp, vol.48, pp.243-264, 1987.
-
(1987)
Math. of Comp
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
22
-
-
84949514743
-
Power Analysis Attacks of Modular Exponentiation in Smartcards
-
LNCS 1717, Springer-Verlag
-
T. Messerges, E. Dabbish, and R. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", CHES'99, LNCS 1717, pp. 144-157, Springer-Verlag, 1999.
-
(1999)
CHES'99
, pp. 144-157
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
23
-
-
84902478482
-
Elliptic Curve Cryptosystems Secure against ZPA
-
(in Japanese), ISEC 2003-103, March, 2004. English version is to appear in the proceedings of CHES 2004
-
H. Morimoto, H. Mamiya, and A. Miyaji, "Elliptic Curve Cryptosystems Secure against ZPA"(in Japanese), Technical Report of the Institute of Electronicas, Information and Communication Engineers (IEICE), ISEC 2003-103, March, 2004. English version is to appear in the proceedings of CHES 2004.
-
Technical Report of the Institute of Electronicas, Information and Communication Engineers (IEICE)
-
-
Morimoto, H.1
Mamiya, H.2
Miyaji, A.3
-
24
-
-
84902467415
-
-
Recommended Elliptic Curves for Federal Government Use, in the appendix of FIPS 186-2, National Institute of Standards and Technology (NIST)
-
Recommended Elliptic Curves for Federal Government Use, in the appendix of FIPS 186-2, National Institute of Standards and Technology (NIST).
-
-
-
-
25
-
-
84944889933
-
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
-
LNCS 2162, Springer-Verlag
-
E. Oswald, and M. Aigner, "Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks", CHES 2001, LNCS 2162, pp.39-50, Springer-Verlag, 2001.
-
(2001)
CHES 2001
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
26
-
-
22844456588
-
Elliptic curves with the Montgomery form and their cryptographic applications
-
LNCS 1751, Springer-Verlag
-
K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic curves with the Montgomery form and their cryptographic applications", PKC 2000, LNCS 1751, pp.446-465, Springer-Verlag, 2000.
-
(2000)
PKC 2000
, pp. 446-465
-
-
Okeya, K.1
Kurumatani, H.2
Sakurai, K.3
-
27
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystem even secure against the timing attack
-
LNCS 1977, Springer-Verlag
-
K. Okeya, and K. Sakurai, "Power analysis breaks elliptic curve cryptosystem even secure against the timing attack", Indocrypt 2000, LNCS 1977, pp. 178-190, Springer-Verlag, 2000.
-
(2000)
Indocrypt 2000
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
28
-
-
84947425601
-
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
-
LNCS 2384, Springer-Verlag
-
K. Okeya, and K. Sakurai, "On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling", ACISP 2002, LNCS 2384, pp.420-435, Springer-Verlag, 2002.
-
(2002)
ACISP 2002
, pp. 420-435
-
-
Okeya, K.1
Sakurai, K.2
-
29
-
-
84939214123
-
A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks
-
to appear in the
-
K. Okeya, and K. Sakurai, "A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks", to appear in the proceedings of 2003 IEEE Information Theory Workshop.
-
Proceedings of 2003 IEEE Information Theory Workshop
-
-
Okeya, K.1
Sakurai, K.2
-
30
-
-
35248865717
-
The Width-w NAF Method Provides Small Memory
-
LNCS 2612, Springer-Verlag
-
K. Okeya, and T. Takagi, "The Width-w NAF Method Provides Small Memory", CT-RSA 2003, LNCS 2612, pp.328-342, Springer-Verlag, 2003.
-
(2003)
CT-RSA 2003
, pp. 328-342
-
-
Okeya, K.1
Takagi, T.2
-
31
-
-
35248826949
-
A More Flexible Countermeasure against Side Channel Attacks using Window Method
-
LNCS 2779, Springer-Verlag
-
K. Okeya, and T. Takagi, "A More Flexible Countermeasure against Side Channel Attacks using Window Method", CHES 2003, LNCS 2779, pp. 397-410 Springer-Verlag, 2003.
-
(2003)
CHES 2003
, pp. 397-410
-
-
Okeya, K.1
Takagi, T.2
-
32
-
-
35248821153
-
An Analysis of Goubin's Refined Power Analysis Attack
-
LNCS 2779, Springer-Verlag
-
N. Smart, "An Analysis of Goubin's Refined Power Analysis Attack", CHES 2003, LNCS 2779, pp.281-290, Springer-Verlag, 2003.
-
(2003)
CHES 2003
, pp. 281-290
-
-
Smart, N.1
|