-
1
-
-
0000694402
-
Low Cost Attacks on Tamper Resistant Devices
-
R. Anderson, M. Kuhn, "Low Cost Attacks on Tamper Resistant Devices," Security Protocol Workshop, April 1997, http://www.cl.cam.ac.uk/ftp/users/rjal4/ tamper2.ps.gz.
-
(1997)
Security Protocol Workshop
-
-
Anderson, R.1
Kuhn, M.2
-
4
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Springer-Verlag, August
-
E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," Advances in Cryptology: Proceedings of CRYPTO '97, Springer-Verlag, August 1997, pp. 513-525.
-
(1997)
Advances in Cryptology: Proceedings of CRYPTO '97
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Springer-Verlag, May
-
D. Boneh, R. DeMillo, and R. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," Advances in Cryptology: Proceedings of EURO-CRYPT '97, Springer-Verlag, May 1997, pp. 37-51.
-
(1997)
Advances in Cryptology: Proceedings of EURO-CRYPT '97
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
6
-
-
84957087033
-
-
Jameco Electronics, Catalog
-
Jameco Electronics, "PC-MultiScope (part #142834)," February 1999 Catalog, p. 103.
-
(1999)
Pc-Multiscope (Part #142834)
, pp. 103
-
-
-
7
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Springer-Verlag, August
-
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology: Proceedings of CRYPTO '96, Springer-Verlag, August 1996, pp. 104-113.
-
(1996)
Advances in Cryptology: Proceedings of CRYPTO '96
, pp. 104-113
-
-
Kocher, P.1
-
8
-
-
85028754650
-
The First Experimental Cryptanalysis of the Data Encryption Standard
-
Springer-Verlag, August
-
M. Matsui, "The First Experimental Cryptanalysis of the Data Encryption Standard," Advances in Cryptology: Proceedings of CRYPTO '94, Springer-Verlag, August 1994, pp. 11.
-
(1994)
Advances in Cryptology: Proceedings of CRYPTO '94
-
-
Matsui, M.1
-
9
-
-
34248682000
-
Data Encryption Standard
-
National Bureau of Standards
-
National Bureau of Standards, "Data Encryption Standard," Federal Information Processing Standards Publication 46, January 1977.
-
(1977)
Federal Information Processing Standards Publication
, pp. 46
-
-
-
10
-
-
73249134721
-
Secure Hash Standard
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, "Secure Hash Standard," Federal Information Processing Standards Publication 180-181, April 1995.
-
(1995)
Federal Information Processing Standards Publication
, pp. 180-181
-
-
-
11
-
-
27544466109
-
A practical implementation of the timing attack
-
J. Dhem, F. Koeune, P. Leroux, P. Mestré, J. Quisquater, and J. Willems, "A practical implementation of the timing attack," UCL Crypto Group Technical Report Series: CG-1998/1, 1998.
-
(1998)
UCL Crypto Group Technical Report Series: CG-1998/1
-
-
Dhem, J.1
Koeune, F.2
Leroux, P.3
Mestré, P.4
Quisquater, J.5
Willems, J.6
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, 21, 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
|