-
2
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Springer-Verla
-
E. Biham, A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In Advances in Cryptology - Crypto'97, LNCS 1294, pages 513-525. Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - Crypto'97, LNCS 1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
84957355967
-
-
n Advances in Cryptology - Eurocrypt'97, LNCS 1233, Springer-Verla
-
D. Boneh, R. DeMillo and R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. n Advances in Cryptology - Eurocrypt'97, LNCS 1233, pages 37-51. Springer-Verlag, 1997.
-
(1997)
On the Importance of Checking Cryptographic Protocols for Faults
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
4
-
-
84949514931
-
-
FIPS PUB 186, February 1, 1993, Digital Signature Standard
-
FIPS PUB 186, February 1, 1993, Digital Signature Standard.
-
-
-
-
5
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
5. T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In IEEE Transactions on Information Theory, volume IT-31, no. 4, pages 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
6
-
-
0001820140
-
Cryptography and computer privacy
-
H. Feistel. Cryptography and computer privacy. In Scientific american, 1973.
-
(1973)
Scientific American
-
-
Feistel, H.1
-
8
-
-
84957644147
-
On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm
-
8. B. S. Kaliski and Y. L. Yin. On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm. In Advances in Cryptology - Crypto 95, LNCS 963, pages 171-184. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - Crypto 95, LNCS 963
, pp. 171-184
-
-
Kaliski, B.S.1
Yin, Y.L.2
-
10
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Springer-Verla
-
Paul C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - Crypto 96, LNCS. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Crypto 96, LNCS
-
-
Kocher, P.C.1
-
11
-
-
84949508672
-
-
P. Kocher, J. Jaffe, B. Jun. Introduction to Differential Power Analysis and Related Attacks. Available from http://www.cryptography.com/dpa/technical/.
-
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
13
-
-
34248682000
-
National Bureau of Standards. Data Encryption Standard
-
U.S. National Bureau of Standards. Data Encryption Standard, Federal Information Processing Standard Publication 46-2, 1977.
-
(1977)
Federal Information Processing Standard Publication
, pp. 46-52
-
-
-
14
-
-
84956855021
-
Evaluating Differential Fault Analysis of Unknown Cryptosystems
-
Springer-Verla
-
P. Paillier. Evaluating Differential Fault Analysis of Unknown Cryptosystems. In Public Key Cryptography - PKC'99, LNCS 1560. Springer-Verlag, 1999.
-
(1999)
Public Key Cryptography - PKC'99, LNCS 1560
-
-
Paillier, P.1
-
15
-
-
84948990100
-
The RC5 Encryption Algorithm
-
Springer-Verla
-
R. L. Rivest. The RC5 Encryption Algorithm. In Fast Software Encryption -Second International Workshop, Leuven, Belgium, LNCS 1008, pages 86-96, Springer-Verlag, 1995.
-
(1995)
Fast Software Encryption -Second International Workshop, Leuven, Belgium, LNCS 1008
, pp. 86-96
-
-
Rivest, R.L.1
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R. L. Rivest, A. Shamir, L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystem. In Communications of the ACM, vol. 21, 1978.
-
(1978)
Communications of the ACM
, vol.21
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
17
-
-
84949516152
-
-
B. Schneier et al. Side-Channel Attacks. To appear In Cardis 98 - LNCS. Springer-Verlag, 1998.
-
-
-
Schneier, B.1
-
18
-
-
84947918919
-
New results in linear cryptanalysis of RC5
-
Springer-Verlag, Springer-Verla
-
A. A. Selcuk. New results in linear cryptanalysis of RC5. In Fast Software Encryption 5 - LNCS 1372. pages 1-16, Springer-Verlag, 1998. Springer-Verlag, 1998.
-
(1998)
Fast Software Encryption 5 - LNCS 1372
, pp. 1-16
-
-
Selcuk, A.A.1
-
19
-
-
84955573096
-
-
J. Kilian, P. Rogaway, "How to protect DES against exhaustive key search, CRYPTO'96, LNCS 1109, Springer-Verlag, 1996, pp. 252-267.
-
(1996)
How to Protect DES against Exhaustive Key Search, CRYPTO'96, LNCS 1109
, pp. 252-267
-
-
Kilian, J.1
Rogaway, P.2
-
21
-
-
84957714601
-
-
Advances in Cryptology, Proceedings of Crypto'95, Springer-Verla
-
R. Anderson, Robustness principles for public-key protocols, LNCS, Advances in Cryptology, Proceedings of Crypto'95, Springer-Verlag, pp. 236-247, 1995.
-
(1995)
Robustness Principles for Public-Key Protocols, LNCS
, pp. 236-247
-
-
Anderson, R.1
-
22
-
-
80051700126
-
-
Proceedings of Asiacrypt'96, Springer-Verla
-
R. Anderson & S. Vaudenay, Minding your p's and q's, LNCS, Advances in Cryptology, Proceedings of Asiacrypt'96, Springer-Verlag, pp. 26-35, 1996.
-
(1996)
Minding Your P's and Q's, LNCS, Advances in Cryptology
, pp. 26-35
-
-
Anderson, R.1
Vaudenay, S.2
-
23
-
-
33746450967
-
-
(G. Brassard ed.), LNCS 435, Springer-Verla
-
C. Schnorr, Efficient Identification and Signatures for Smart-Cards, Advances in Cryptology: Eurocrypt'89 (G. Brassard ed.), LNCS 435, Springer-Verlag, pp. 239-252, 1990.
-
(1990)
Efficient Identification and Signatures for Smart-Cards, Advances in Cryptology: Eurocrypt'89
, pp. 239-252
-
-
Schnorr, C.1
|