-
1
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Full paper (30 pages)February 1999, An extended Abstract appears in H. Krawczyk, ed., Springer-Verlag
-
Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. Relations among notions of security for public-key encryption schemes. Full paper (30 pages), February 1999. An extended Abstract appears in H. Krawczyk, ed., Advances in Cryptology-CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, pages 26-45, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology-CRYPTO’98, Volume 1462 of Lecture Notes in Computer Science
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
84948986458
-
Optimal asymmetric encryption
-
A. De Santis, editor, Springer-Verlag
-
Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption. In A. De Santis, editor, Advances in Cryptology-EUROCRYPT’94, volume 950 of Lecture Notes in Computer Science, pages 92-111. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology-EUROCRYPT’94, Volume 950 of Lecture Notes in Computer Science
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0344489746
-
Addition chains using continued fractions
-
F. Bergeron, J. Berstel, S. Brlek, and C. Duboc. Addition chains using continued fractions. Journal of Algorithms, 10(3):403-412, September 1989.
-
(1989)
Journal of Algorithms
, vol.10
, Issue.3
, pp. 403-412
-
-
Bergeron, F.1
Berstel, J.2
Brlek, S.3
Duboc, C.4
-
5
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
M. Wiener, editor, Springer-Verlag
-
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. Towards sound approaches to counteract power-analysis attacks. In M. Wiener, editor, Advances in Cryptology-CRYPTO’99, volume 1666 of Lecture Notes in Computer Science, pages 398-412. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology-CRYPTO’99, Volume 1666 of Lecture Notes in Computer Science
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
6
-
-
84926399824
-
On the foundations of modern cryptography
-
B. Kaliski, editor,, Springer-Verlag
-
Oded Goldreich. On the foundations of modern cryptography. In B. Kaliski, editor, Advances in Cryptology-CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 46-74. Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology-CRYPTO’97, Volume 1294 of Lecture Notes in Computer Science
, pp. 46-74
-
-
Goldreich, O.1
-
9
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
N. Koblitz, editor, Springer-Verlag
-
Paul Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology-CRYPTO’96, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-CRYPTO’96, Volume 1109 of Lecture Notes in Computer Science
, pp. 104-113
-
-
Kocher, P.1
-
11
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO’99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology-CRYPTO’99, Volume 1666 of Lecture Notes in Computer Science
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
0032118606
-
Walter. Exponentiation using division chains
-
Colin D. Walter. Exponentiation using division chains. IEEE Transactions on Computers, 47(7):757-765, July 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.7
, pp. 757-765
-
-
Colin, D.1
|