-
1
-
-
84944905303
-
Universal Exponentiation Algorithm, Cryptographic Hardware and Embedded Systems – CHES 2001
-
Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
C. Clavier & M. Joye, Universal Exponentiation Algorithm, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 300–308.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 300-308
-
-
Clavier, C.1
Joye, M.2
-
2
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems – CHES 2001
-
Ç. Koç, D. Naccache & C. Paar (editors), Springer- Verlag
-
K. Gandolfi, C. Mourtel & F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer- Verlag, 2001, 251–261.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
3
-
-
0003340059
-
The Art of Computer Programming
-
Edition, Addison-Wesley
-
D. E. Knuth, The Art of Computer Programming, vol. 2, “Seminumerical Algorithms”, 2nd Edition, Addison-Wesley, 1981, 441–466.
-
(1981)
Seminumerical Algorithms
, vol.2
, pp. 441-466
-
-
Knuth, D.E.1
-
4
-
-
84943632039
-
Timing Attack on Implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology – Crypto’96
-
N. Koblitz (editor), Springer-Verlag
-
P. Kocher, Timing Attack on Implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology – Crypto’96, N. Koblitz (editor), Lecture Notes in Computer Science, 1109, Springer-Verlag, 1996, 104–113.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
5
-
-
84939573910
-
Differential Power Analysis, Advances in Cryptology – Crypto’99
-
M. Wiener (editor), Springer-Verlag
-
P. Kocher, J. Jaffe & B. Jun, Differential Power Analysis, Advances in Cryptology – Crypto’99, M. Wiener (editor), Lecture Notes in Computer Science, 1666, Springer-Verlag, 1999, 388–397.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
6
-
-
84944906595
-
Random Register Renaming to Foil DPA, Cryptographic Hardware and Embedded Systems – CHES 2001
-
Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
D. May, H.L. Muller & N.P. Smart, Random Register Renaming to Foil DPA, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 28–38.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 28-38
-
-
May, D.1
Muller, H.L.2
Smart, N.P.3
-
7
-
-
84949514743
-
Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems (Proc CHES 99)
-
C. Paar & Ç. Koç (editors), Springer-Verlag
-
T. S. Messerges, E. A. Dabbish & R. H. Sloan, Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems (Proc CHES 99), C. Paar & Ç. Koç (editors), Lecture Notes in Computer Science, 1717, Springer-Verlag, 1999, 144–157.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
8
-
-
84944889933
-
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems – CHES 2001
-
Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
E. Oswald & M. Aigner, Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 39–50.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
9
-
-
0032118606
-
Exponentiation using Division Chains
-
July
-
C. D. Walter, Exponentiation using Division Chains, IEEE Transactions on Computers, 47, No. 7, July 1998, 757–765.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.7
, pp. 757-765
-
-
Walter, C.D.1
-
10
-
-
84937560280
-
Distinguishing Exponent Digits by Observing Modular Subtractions, Topics in Cryptology − CT-RSA 2001
-
D. Naccache (editor), Springer-Verlag
-
C. D. Walter & S. Thompson, Distinguishing Exponent Digits by Observing Modular Subtractions, Topics in Cryptology − CT-RSA 2001, D. Naccache (editor), Lecture Notes in Computer Science, 2020, Springer-Verlag, 2001, 192–207.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
-
11
-
-
84944888189
-
Sliding Windows succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems – CHES 2001
-
Ç. Koç, D. Naccache & C. Paar (editors), Springer-Verlag
-
C. D. Walter, Sliding Windows succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems – CHES 2001, Ç. Koç, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 286–299.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 286-299
-
-
Walter, C.D.1
-
12
-
-
84944900219
-
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli, Topics in Cryptology − CT-RSA 2002
-
B. Preneel (editor),, Springer-Verlag, This Volume
-
C. D. Walter, Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli, Topics in Cryptology − CT-RSA 2002, B. Preneel (editor), Lecture Notes in Computer Science, 2271, Springer-Verlag, 2002, 30–39, This Volume.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 30-39
-
-
Walter, C.D.1
|