-
1
-
-
84957355967
-
-
W. Fumy (ed.)
-
Boneh, D., Demillo, R.A., and Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: W. Fumy (ed.): Advances in Cryptology - Eurocrypt '97, New York, Springer (1997), 37-51.
-
(1997)
On the Importance of Checking Cryptographic Protocols for Faults.
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
2
-
-
84954462346
-
A Practical Implementation of the Timing Attack
-
In: J.-J. Quisquater and B. Schneier (eds.)
-
Dhem, J.-F., Koeune, F., Leroux, P.-A., Mestré, P., Quisquater, J.-J., and Willems, J.-L.: A Practical Implementation of the Timing Attack. In: J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications. Lecture Notes in Computer Science 1820, Berlin, Springer (2000), 175-191.
-
(1820)
Smart Card - Research and Applications. Lecture Notes in Computer Science
, pp. 175-191
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
4
-
-
85025266676
-
An Introduction to Probability Theory and its Applications (Vol
-
New York
-
Feller, W.: An Introduction to Probability Theory and its Applications (Vol. 1), New York, Wiley (1967).
-
(1967)
1)
-
-
Feller, W.1
-
5
-
-
84876346090
-
The Central Limit Theorem for Dependent Random Variables
-
Hoeffding, W. and Robbins, H.: The Central Limit Theorem for Dependent Random Variables, Duke Math. J. 15, 773-780 (1948).
-
(1948)
Duke Math
, vol.15
, pp. 773-780
-
-
Hoeffding, W.1
Robbins, H.2
-
6
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA
-
N. Koblitz (ed.)
-
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In: N. Koblitz (ed.): Advances in Cryptology - Crypto '96. Lecture Notes in Computer Science 1109, Berlin, Springer (1996), 104-113.
-
(1996)
DSS and Other Systems
, pp. 104-113
-
-
Kocher, P.1
-
7
-
-
84939573910
-
Differential Power Analysis
-
In: M. Wiener (ed.): Advances in Cryptology - Crypto '99 (Proceedings)
-
Kocher, P., Jaffe, J., and Jub, B.: Differential Power Analysis. In: M. Wiener (ed.): Advances in Cryptology - Crypto '99 (Proceedings). Lecture Notes in Computer Science 1666, Berlin, Springer (1999), 388-397.
-
(1666)
Lecture Notes in Computer Science
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jub, B.3
-
9
-
-
84944878354
-
-
Boca Raton
-
Menezes, A.J., van Oorschot, P.C., and Vanstone, S.C.: Handbook of Applied Cryptography, Boca Raton, CRC Press (1997).
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.C.3
-
10
-
-
84966243285
-
Modular Multiplication without Trial Division
-
(April 1985)
-
Montgomery, P.L.: Modular Multiplication without Trial Division, Math. Comp. 44, no. 170, 519-521 (April 1985).
-
Math. Comp. 44
, pp. 519-521
-
-
Montgomery, P.L.1
-
11
-
-
68549092451
-
A Timing Attack against RSA with the Chinese Remainder Theorem
-
C. Paar (eds.)
-
Schindler, W.: A Timing Attack against RSA with the Chinese Remainder Theorem. In: ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems CHES 2000. Lecture Notes in Computer Science 1965, Berlin, Springer (2000), 109-124.
-
(2000)
ç.K. Koç
, pp. 109-124
-
-
Schindler, W.1
-
12
-
-
18844409918
-
Unleashing the Full Power of Timing Attack
-
Submitted.
-
Schindler, W., Koeune, F., and Quisquater, J.-J.: Unleashing the Full Power of Timing Attack. Submitted.
-
-
-
Schindler, W.1
Koeune, F.2
Quisquater, J.-J.3
-
14
-
-
0003774228
-
Mathematische Statistik I
-
Stuttgart, Teubner
-
Witting, H.: Mathematische Statistik I, Stuttgart, Teubner (1985).
-
(1985)
-
-
Witting, H.1
|