-
2
-
-
58149338046
-
MARS-A Candidate Cipher for AES
-
Carolynn Burwick, Don Coppersmith, Edward D’Avignon, Rosario Gennaro, Shai Halevi, Charanjit Jutla, Stephen M. Matyas, Luke O’Connor, Mohammad Peyravian, David Safford and Nevenko Zunic, “MARS-A Candidate Cipher for AES”, NIST AES Proposal, June 1998. Available at: http://www.research.ibm.com/security/mars.pdf
-
(1998)
NIST AES Proposal
-
-
Burwick, C.1
Coppersmith, D.2
D’Avignon, E.3
Gennaro, R.4
Halevi, S.5
Jutla, C.6
Matyas, S.M.7
O’Connor, L.8
Peyravian, M.9
Safford, D.10
Zunic, N.11
-
3
-
-
0012022904
-
A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards
-
Suresh Chari, Charantjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards”, in Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, http://csrc.nist.gov/encryption/aes/round1/Conf2/aes2conf.htm, March 1999.
-
(1999)
Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Springer-Verlag
-
Suresh Chari, Charantjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks”, in Proceedings of Advances in Cryptology – CRYPTO’99, Springer-Verlag, 1999, pp. 398-412.
-
(1999)
Proceedings of Advances in Cryptology – CRYPTO’99
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
5
-
-
84880293917
-
Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Springer-Verlag, August
-
Jean-Sébastien Coron, “Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems”, in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 292-302.
-
(1999)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, pp. 292-302
-
-
Coron, J.-S.1
-
10
-
-
84944955363
-
Procédé de s´ecurisationd’unen semble électronique de cryptographie à clé secrète contre les attaques par analyse physique
-
Schlumberger, February 4th, Publication Number: 2789535
-
Louis Goubin and J. Patarin, “Procédé de s´ecurisationd’unen semble électronique de cryptographie à clé secrète contre les attaques par analyse physique”, European Patent, Schlumberger, February 4th, 1999, Publication Number: 2789535.
-
(1999)
European Patent
-
-
Goubin, L.1
Patarin, J.2
-
13
-
-
84939573910
-
Differential Power Analysis
-
Springer-Verlag
-
Paul Kocher, Joshua Jaffe and Benjamin Jun, “Differential Power Analysis”, in Proceedings of Advances in Cryptology – CRYPTO’99, Springer-Verlag, 1999, pp. 388-397.
-
(1999)
Proceedings of Advances in Cryptology – CRYPTO’99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
17
-
-
84949514743
-
Power Analysis Attacks of Modular ExponentiationinSmartcards
-
Springer-Verlag, August
-
Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan, “Power Analysis Attacks of Modular ExponentiationinSmartcards”, in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 144-157.
-
(1999)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
18
-
-
84944955364
-
-
August 20
-
Ronald L. Rivest, Matthew J.B. Robshaw, Ray Sidney and Yiqun L. Yin, “The RC6 Block Cipher”, v1.1, August 20, 1998. Available at: ftp://ftp.rsasecurity.com/pub/rsalabs/aes/rc6v11.pdf
-
(1998)
The RC6 Block Cipher
, vol.1
-
-
Rivest, R.L.1
Robshaw, M.J.2
Sidney, R.3
Yin, Y.L.4
-
19
-
-
0003412071
-
-
June 15,, AES submission available
-
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson, “Twofish: A 128-Bit Block Cipher”, June 15, 1998, AES submission available at: http://www.counterpane.com/twofish.pdf
-
(1998)
Twofish: A 128-Bit Block Cipher
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
|