-
1
-
-
84958979095
-
-
Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science
-
Bier, É., and Joye, M. Weierstraß elliptic curves and side-channel attacks. In Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 335–345.
-
Weierstraß Elliptic Curves and Side-Channel Attacks
, pp. 335-345
-
-
Bier, É.1
Joye, M.2
-
2
-
-
3042641393
-
On the importance of eliminating errors in cryptographic computations
-
Boneh, D., DeMillo, R. A., and Lipton, R. J. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14 (2001), 101–119.
-
(2001)
Journal of Cryptology
, vol.14
, pp. 101-119
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
3
-
-
85027967075
-
Fast exponentiation with precomputation
-
R. A. Rueppel, Ed., vol. 658 of Lecture Notes in Computer Science
-
Brickell, E. F., Gordon, D. M., McCurley, K. S., and Wilson, D. B. Fast exponentiation with precomputation. In Advances in Cryptology–EUROCRYPT’92 (1993), R. A. Rueppel, Ed., vol. 658 of Lecture Notes in Computer Science, pp. 200–207.
-
(1993)
Advances in Cryptology–EUROCRYPT’92
, pp. 200-207
-
-
Brickell, E.F.1
Gordon, D.M.2
McCurley, K.S.3
Wilson, D.B.4
-
4
-
-
84944905303
-
Universalexp onentiation algorithm–a first step towards provable SPA-resistance
-
Ç. K. Koç, D. Naccache, and C. Paar, Eds., vol. 2162 of Lecture Notes in Computer Science
-
Clavier, C., and Joye, M. Universalexp onentiation algorithm–a first step towards provable SPA-resistance. In Cryptographic Hardware and Embedded Systems–CHES 2001 (2001), Ç. K. Koç, D. Naccache, and C. Paar, Eds., vol. 2162 of Lecture Notes in Computer Science, pp. 300–308.
-
(2001)
Cryptographic Hardware and Embedded Systems–CHES 2001
, pp. 300-308
-
-
Clavier, C.1
Joye, M.2
-
5
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science
-
Coron, J.-S. Resistance against differential power analysis for elliptic curve cryptosystems. In Cryptographic Hardware and Embedded Systems–CHES’99 (1999), Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science, pp. 292–302.
-
(1999)
Cryptographic Hardware and Embedded Systems–CHES’99
, pp. 292-302
-
-
Coron, J.-S.1
-
6
-
-
84945271956
-
-
Parallel scalar multiplication on general elliptic curves over Fp hedged against nondifferentialside-c hannelattac ks. Cryptology ePrint Archive Report 2002/007
-
Fischer, W., Giraud, C., Knudsen, E. W., and Jean-Pierre, S. Parallel scalar multiplication on general elliptic curves over Fp hedged against nondifferentialside-c hannelattac ks. Cryptology ePrint Archive Report 2002/007, 2002. Available from http://eprint.iacr.org/.
-
(2002)
-
-
Fischer, W.1
Giraud, C.2
Knudsen, E.W.3
Jean-Pierre, S.4
-
7
-
-
84945262043
-
-
IEEE stand ard specifications for public-key cryptography. IEEE Std 1363-2000
-
Institute of Electrical and Electronics Engineers (IEEE). IEEE stand ard specifications for public-key cryptography. IEEE Std 1363-2000, 2000.
-
(2000)
-
-
-
8
-
-
84949515158
-
Fast implementation of public-key cryptography on a DSP TMS320C6201
-
Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science
-
Itoh, K., Takenaka, M., Torii, N., Temma, S., and Kurihara, Y. Fast implementation of public-key cryptography on a DSP TMS320C6201. In Cryptographic Hardware and Embedded Systems–CHES’99 (1999), Ç. K. Koç and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science, pp. 61–72.
-
(1999)
Cryptographic Hardware and Embedded Systems–CHES’99
, pp. 61-72
-
-
Itoh, K.1
Takenaka, M.2
Torii, N.3
Temma, S.4
Kurihara, Y.5
-
9
-
-
84958955271
-
A fast parallel elliptic curve multiplication resistant against side channelattacks
-
D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science
-
Izu, T., and Takagi, T. A fast parallel elliptic curve multiplication resistant against side channelattacks. In Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 280–296.
-
(2002)
Public Key Cryptography–PKC 2002
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
10
-
-
84945318651
-
-
The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (2nde d.). Addison-Wesley
-
Knuth, D. E. The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (2nde d.). Addison-Wesley, 1981.
-
(1981)
-
-
Knuth, D.E.1
-
11
-
-
84945248936
-
-
The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (3rde d.). Addison-Wesley
-
Knuth, D. E. The Art of Computer Programming–Vol. 2: Seminumerical Algorithms (3rde d.). Addison-Wesley, 1998.
-
(1998)
-
-
Knuth, D.E.1
-
12
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science
-
Kocher, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology–CRYPTO’96 (1996), N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science, pp. 104–113.
-
(1996)
Advances in Cryptology–CRYPTO’96
, pp. 104-113
-
-
Kocher, P.C.1
-
13
-
-
84939573910
-
Differentialp ower analysis
-
M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science
-
Kocher, P. C., Jaffe, J., and Jun, B. Differentialp ower analysis. In Advances in Cryptology–CRYPTO’99 (1999), M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science, pp. 388–397.
-
(1999)
Advances in Cryptology–CRYPTO’99
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
14
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Ç. K. Koç and C. Paar, Eds., vol. 1965 of Lecture Notes in Computer Science
-
Messerges, T. S. Using second-order power analysis to attack DPA resistant software. In Cryptographic Hardware and Embedded Systems–CHES 2000 (2000), Ç. K. Koç and C. Paar, Eds., vol. 1965 of Lecture Notes in Computer Science, pp. 238–251.
-
(2000)
Cryptographic Hardware and Embedded Systems–CHES 2000
, pp. 238-251
-
-
Messerges, T.S.1
-
15
-
-
84947262754
-
Securing elliptic curve point multiplication against side-channel attacks
-
G. I. Davida and Y. Frankel, Eds., vol. 2200 of Lecture Notes in Computer Science
-
Möller, B. Securing elliptic curve point multiplication against side-channel attacks. In Information Security–ISC 2001 (2001), G. I. Davida and Y. Frankel, Eds., vol. 2200 of Lecture Notes in Computer Science, pp. 324–334.
-
(2001)
Information Security–ISC 2001
, pp. 324-334
-
-
Möller, B.1
-
17
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Montgomery, P. L. Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48 (1987), 243–264.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 243-264
-
-
Montgomery, P.L.1
-
19
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
-
B. K. Roy and E. Okamoto, Eds., vol. 1977 of Lecture Notes in Computer Science
-
Okeya, K., and Sakurai, K. Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. In Progress in Cryptology–INDOCRYPT 2000 (2000), B. K. Roy and E. Okamoto, Eds., vol. 1977 of Lecture Notes in Computer Science, pp. 178–190.
-
(2000)
Progress in Cryptology–INDOCRYPT 2000
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
20
-
-
84945276014
-
A second-order DPA attack breaks a windowmethod based countermeasure against side channelattacks
-
(these proceedings), A. H. Chan and V. Gligor, Eds
-
Okeya, K., and Sakurai, K. A second-order DPA attack breaks a windowmethod based countermeasure against side channelattacks. In Information Security–ISC 2002 (these proceedings), A. H. Chan and V. Gligor, Eds.
-
Information Security–ISC 2002
-
-
Okeya, K.1
Sakurai, K.2
-
21
-
-
84958960266
-
A combined timing and power attack
-
D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science
-
Schindler, W. A combined timing and power attack. In Public Key Cryptography–PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 263–279.
-
(2002)
Public Key Cryptography–PKC 2002
, pp. 263-279
-
-
Schindler, W.1
-
24
-
-
84937560280
-
Distinguishing exponent digits by observing modular subtractions
-
D. Naccache, Ed., vol. 2020 of Lecture Notes in Computer Science
-
Walter, C. D., and Thompson, S. Distinguishing exponent digits by observing modular subtractions. In Progress in Cryptology–CT-RSA 2001 (2001), D. Naccache, Ed., vol. 2020 of Lecture Notes in Computer Science, pp. 192–207.
-
(2001)
Progress in Cryptology–CT-RSA 2001
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
-
25
-
-
0346395014
-
On the evaluation of powers
-
Yao, A. C. -C. On the evaluation of powers. SIAM Journal on Computing 5 (1976), 100–103.
-
(1976)
SIAM Journal on Computing
, vol.5
, pp. 100-103
-
-
Yao, A.C.1
|