-
1
-
-
84974660062
-
-
Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
ANSI X9.62-1998, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1998.
-
(1998)
-
-
-
2
-
-
84958979095
-
Weierstraß Elliptic Curves and Side-Channel Attacks
-
Springer-Verlag
-
E. Brier and M. Joye, “Weierstraß Elliptic Curves and Side-Channel Attacks”, PKC 2002, LNCS 2274, pp. 335–345, Springer-Verlag, 2002.
-
(2002)
PKC 2002, LNCS
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
3
-
-
84944905303
-
Universal exponentiation algorithm–A first step towards provable SPA-resistance–
-
C. Clavier and M. Joye, “Universal exponentiation algorithm–A first step towards provable SPA-resistance–”, CHES 2001, LNCS 2162, pp. 300–308, 2001.
-
(2001)
CHES 2001, LNCS
, vol.2162
, pp. 300-308
-
-
Clavier, C.1
Joye, M.2
-
4
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
H. Cohen, A. Miyaji and T. Ono, “Efficient elliptic curve exponentiation using mixed coordinates”, ASIACRYPT’98, LNCS 1514, pp. 51–65, 1998.
-
(1998)
ASIACRYPT’98, LNCS
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
5
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
J. Coron, “Resistance against differential power analysis for elliptic curve cryptosystems”, CHES’99, LNCS 1717, pp. 292–302, 1999.
-
(1999)
CHES’99, LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.1
-
6
-
-
84949515158
-
Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201
-
K. Itoh, et al. “Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201”, CHES’99, LNCS 1717, pp. 61–72, 1999.
-
(1999)
CHES’99, LNCS
, vol.1717
, pp. 61-72
-
-
Itoh, K.1
-
7
-
-
35248835491
-
DPA Countermeasures by improving the Window Method
-
K. Itoh, J. Yajima, M. Takenaka, and N. Torii, “DPA Countermeasures by improving the Window Method”, to appear in CHES 2002, 2002
-
(2002)
CHES 2002
-
-
Itoh, K.1
Yajima, J.2
Takenaka, M.3
Torii, N.4
-
8
-
-
84958955271
-
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
-
T. Izu and T. Takagi, “A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks”, PKC 2002, LNCS 2274, pp. 280–296, 2002.
-
(2002)
PKC 2002, LNCS
, vol.2274
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
11
-
-
84944884283
-
Hessian elliptic curves and side-channel attacks
-
M. Joye and J. Quisquater, “Hessian elliptic curves and side-channel attacks”, CHES 2001, LNCS 2162, pp. 402–410, 2001.
-
(2001)
CHES 2001, LNCS
, vol.2162
, pp. 402-410
-
-
Joye, M.1
Quisquater, J.2
-
12
-
-
84944901711
-
Protections against differential analysis for elliptic curve cryptography
-
M. Joye and C. Tymen, “Protections against differential analysis for elliptic curve cryptography”, CHES 2001, LNCS 2162, pp. 377–390, 2001.
-
(2001)
CHES 2001, LNCS
, vol.2162
, pp. 377-390
-
-
Joye, M.1
Tymen, C.2
-
13
-
-
84943632039
-
Timing Attackson Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
C. Kocher, “Timing Attackson Implementations of Diffie-Hellman, RSA, DSS, and Other Systems”, CRYPTO’96, LNCS 1109, pp. 104–113, 1996.
-
(1996)
CRYPTO’96, LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, C.1
-
14
-
-
84939573910
-
Differential power analysis
-
C. Kocher, J. Jaffe and B. Jun, “Differential power analysis”, CRYPTO’99, LNCS 1666, pp. 388–397, 1999.
-
(1999)
CRYPTO’99, LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, C.1
Jaffe, J.2
Jun, B.3
-
15
-
-
84944898712
-
Preventing SPA/DPA in ECC systems using the Jacobi form
-
P. Liardet and N. Smart, “Preventing SPA/DPA in ECC systems using the Jacobi form”, CHES 2001, LNCS 2162, pp. 391–401, 2001.
-
(2001)
CHES 2001, LNCS
, vol.2162
, pp. 391-401
-
-
Liardet, P.1
Smart, N.2
-
17
-
-
84947262754
-
Securing elliptic curve point multiplication against side-channel attacks
-
Springer-Verlag
-
B. Möller, “Securing elliptic curve point multiplication against side-channel attacks”, ISC 2001, LNCS 2200. pp. 324-334, Springer-Verlag, 2001.
-
(2001)
ISC 2001, LNCS 2200
, pp. 324-334
-
-
Möller, B.1
-
18
-
-
84947262754
-
Securing elliptic curve point multiplication against side-channel attacks
-
B. Möller, “Securing elliptic curve point multiplication against side-channel attacks”, Addendum: efficiency improvement, http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/ecc-sca-isc01.pdf, 2001.
-
(2001)
Addendum: Efficiency Improvement
-
-
Möller, B.1
-
19
-
-
84945249400
-
Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks
-
B. Möller, “Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks”, ISC 2002, LNCS 2433. pp. 402-413, 2002.
-
(2002)
ISC 2002, LNCS
, vol.2433
, pp. 402-413
-
-
Möller, B.1
-
20
-
-
84968484435
-
Speeding the Pollard and elliptic curve methodsfor factorizations
-
P. Montgomery, “Speeding the Pollard and elliptic curve methodsfor factorizations”, Math. Comp., vol. 48, pp. 243–264, 1987.
-
(1987)
Math. Comp
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
21
-
-
84974722236
-
-
Recommended Elliptic Curvesfor Federal Government Use, Appendix to FIPS 186-2
-
National Institute of Standards and Technology, Recommended Elliptic Curvesfor Federal Government Use, Appendix to FIPS 186-2, 2000.
-
(2000)
-
-
-
22
-
-
84944889933
-
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
-
E. Oswald, M. Aigner, “Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks”, CHES 2001, LNCS 2162, pp. 39-50, 2001.
-
(2001)
CHES 2001, LNCS
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
24
-
-
84949949652
-
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery form Elliptic Curve Secure against Side Channel Attacks
-
Springer-Verlag
-
K. Okeya, K. Miyazaki, and K. Sakurai, “A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery form Elliptic Curve Secure against Side Channel Attacks”, ICISC 2001, LNCS 2288, pp.428-439, Springer-Verlag, 2002.
-
(2002)
ICISC 2001, LNCS
, vol.2288
, pp. 428-439
-
-
Okeya, K.1
Miyazaki, K.2
Sakurai, K.3
-
25
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
-
Springer-Verlag
-
K. Okeya and K. Sakurai, “Power analysis breaks elliptic curve cryptosystems even secure against the timing attack”, INDOCRYPT 2000, LNCS 1977, pp. 178–190, Springer-Verlag, 2000.
-
(2000)
INDOCRYPT 2000, LNCS 1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
26
-
-
84944875437
-
Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve
-
Springer-Verlag
-
K. Okeya and K. Sakurai, “Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve”, CHES 2001, LNCS 2162, pp. 126–141, Springer-Verlag, 2001.
-
(2001)
CHES 2001, LNCS
, vol.2162
, pp. 126-141
-
-
Okeya, K.1
Sakurai, K.2
-
27
-
-
84947425601
-
On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
-
K. Okeya, and K. Sakurai, “On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling”, ACISP 2002, LNCS 2384, pp. 420–435, 2002.
-
(2002)
ACISP 2002, LNCS
, vol.2384
, pp. 420-435
-
-
Okeya, K.1
Sakurai, K.2
-
28
-
-
84945314413
-
A Second-Order DPA Attack Breaksa Windowmethod based Countermeasure against Side Channel Attacks
-
K. Okeya, and K. Sakurai, “A Second-Order DPA Attack Breaksa Windowmethod based Countermeasure against Side Channel Attacks”, ISC 2002, LNCS 2433, pp. 389–401, 2002.
-
(2002)
ISC 2002, LNCS
, vol.2433
, pp. 389-401
-
-
Okeya, K.1
Sakurai, K.2
-
29
-
-
84958960266
-
A Combined Timing and Power Attack
-
Springer-Verlag
-
W. Schindler, “A Combined Timing and Power Attack”, PKC 2002, LNCS 2274, pp. 263–279, Springer-Verlag, 2002.
-
(2002)
PKC 2002, LNCS
, vol.2274
, pp. 263-279
-
-
Schindler, W.1
-
30
-
-
85027140454
-
DPA-Gegenmaßnahmen bei einer ECDSA-Implementierung auf Chipkarten
-
M. Seysen, “DPA-Gegenmaßnahmen bei einer ECDSA-Implementierung auf Chipkarten”, presented at DPA Workshop, Bonn (BSI), ECC Brainpool, 2001.
-
(2001)
DPA Workshop, Bonn (BSI), ECC Brainpool
-
-
Seysen, M.1
-
31
-
-
84974693569
-
-
SEC 1: Elliptic Curve Cryptography, Version 1.0
-
Standards for Efficient Cryptography Group/Certicom Research, SEC 1: Elliptic Curve Cryptography, Version 1.0, 2000. Available from http://www.secg.org/.
-
(2000)
-
-
-
32
-
-
84974660053
-
-
SEC 2: Recommended Elliptic Curve Cryptography Domain Parameters, Version 1.0
-
Standardsf or Efficient Cryptography Group/Certicom Research, SEC 2: Recommended Elliptic Curve Cryptography Domain Parameters, Version 1.0, 2000.
-
(2000)
-
-
-
33
-
-
84974668057
-
Smart Cards–Requirements, Properties and Applications–
-
K. Vedder and F. Weikmann, “Smart Cards–Requirements, Properties and Applications–”, Chipkarten, Vieweg, pp. 1-23, 1998.
-
(1998)
Chipkarten, Vieweg
, pp. 1-23
-
-
Vedder, K.1
Weikmann, F.2
-
34
-
-
84937560280
-
Distinguishing Exponent Digits by Observing Modular Subtractions
-
C. D. Walter and S. Thompson, “Distinguishing Exponent Digits by Observing Modular Subtractions”, CT-RSA 2001, LNCS 2020, pp. 192–207, 2001.
-
(2001)
CT-RSA 2001, LNCS
, vol.2020
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
-
35
-
-
0842283870
-
Breaking the Liardet-Smart Randomized Exponentiation Algorithm
-
C.D. Walter, “Breaking the Liardet-Smart Randomized Exponentiation Algorithm”, to appear in CARDIS’02.
-
CARDIS’02
-
-
Walter, C.D.1
|