-
1
-
-
84954462346
-
A Practical Implementation of the Timing Attack
-
J.-J. Quisquater and B. Schneier (eds.), Berlin,Springer
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P.-A. Mestré, J.-J. Quisquater, J.-L. Willems: A Practical Implementation of the Timing Attack. In: J.-J. Quisquater and B. Schneier (eds.): Smart Card – Research and Applications. Lecture Notes in Computer Science 1820,Berlin,Springer (2000),175–191.
-
(2000)
Smart Card – Research and Applications. Lecture Notes in Computer Science 1820
, pp. 175-191
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.-A.4
Quisquater, J.-J.5
Willems, J.-L.6
-
2
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS and Other Systems
-
N. Koblitz (ed.), Lecture Notes in Computer Science 1109. Springer,Heidelb erg
-
P. Kocher: Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS and Other Systems. In: N. Koblitz (ed.): Advances in Cryptology – Crypto’96,Lecture Notes in Computer Science 1109. Springer,Heidelb erg (1996),104–113.
-
(1996)
Advances in Cryptology – Crypto’96
, pp. 104-113
-
-
Kocher, P.1
-
3
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results
-
Ç.K. Koç,D. Naccache,C. Paar (eds.), Springer,Lecture Notes in Computer Science 2162,Berlin
-
K. Gandolfi, C. Mourtel, F. Olivier: Electromagnetic Analysis: Concrete Results. In: Ç.K. Koç,D. Naccache,C. Paar (eds.): Cryptographic Hardware and Embedded Systems — CHES 2001,Springer,Lecture Notes in Computer Science 2162,Berlin (2001),251–261.
-
(2001)
Cryptographic Hardware and Embedded Systems — CHES 2001
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
4
-
-
84939573910
-
Differential Power Analysis
-
M. Wiener (ed.), Berlin,Springer
-
P. Kocher, J. Jaffe, B. Jub: Differential Power Analysis. In: M. Wiener (ed.): Advances in Cryptology – Crypto’99. Lecture Notes in Computer Science 1666, Berlin,Springer (1999),388–397.
-
(1999)
Advances in Cryptology – Crypto’99. Lecture Notes in Computer Science 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jub, B.3
-
6
-
-
84966243285
-
Modular Multiplication without Trial Division
-
P.L. Montgomery: Modular Multiplication without Trial Division, Math. Comp. 44,no. 170,519–521 (April 1985).
-
(1985)
Math. Comp
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
8
-
-
85099426899
-
A Timing Attack against RSA with the Chinese Remainder Theorem
-
Ç.K. Koç,C. Paar (eds.), Springer,Lecture Notes in Computer Science 1965,Berlin
-
W. Schindler: A Timing Attack against RSA with the Chinese Remainder Theorem. In: Ç.K. Koç,C. Paar (eds.): Cryptographic Hardware and Embedded Systems — CHES 2000,Springer,Lecture Notes in Computer Science 1965,Berlin (2000),110–125.
-
(2000)
Cryptographic Hardware and Embedded Systems — CHES 2000
, pp. 110-125
-
-
Schindler, W.1
-
9
-
-
84937560280
-
Distinguishing Exponent Digits by Observing Modular Subtractions
-
D. Naccache (ed.), Springer,Lecture Notes in Computer Science 2020,Berlin
-
C.D. Walter, S. Thompson: Distinguishing Exponent Digits by Observing Modular Subtractions. In: D. Naccache (ed.): Topics in Cryptology – CT-RSA 2001, Springer,Lecture Notes in Computer Science 2020,Berlin (2000),192–207.
-
(2000)
Topics in Cryptology – CT-RSA 2001
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
|