-
2
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the importance of checking cryptographic protocols for faults. Lecture Notes in Computer Science, 1233:37-51, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
3
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10:233-260, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, pp. 233-260
-
-
Coppersmith, D.1
-
4
-
-
84954462346
-
A practical implementation of the timing attack
-
Jean-Francois Dhem, Francois Koeune, PhilippeAlexandre Leroux, Patrick Mestre, Jean-Jacques Quisquater, and Jean-Louis Willems. A practical implementation of the timing attack. In CARDIS, pages 167-182, 1998.
-
(1998)
CARDIS
, pp. 167-182
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux Philippe, A.3
Mestre, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
5
-
-
84888203263
-
-
Peter Gutmann. Cryptlib. http://www.cs.auckland.ac.nz/~pgut001/cryptlib/.
-
Cryptlib
-
-
Gutmann, P.1
-
9
-
-
84939573910
-
Differential power analysis: Leaking secrets
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis: Leaking secrets. In Crypto 99, pages 388-397, 1999.
-
(1999)
Crypto 99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Paul Kocher. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. Advances in Cryptology, pages 104-113, 1996.
-
(1996)
Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.1
-
12
-
-
0041746791
-
-
Mod SSL Project. mod ssl. http://www.modssl.org.
-
Mod SSL Project
-
-
-
13
-
-
84966243285
-
Modular multiplication without trial division
-
Peter Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.1
-
14
-
-
85077739623
-
-
GNU Project. libgcrypt. http://www.gnu.org/directory/security/libgcrypt.html.
-
Libgcrypt
-
-
-
15
-
-
85077749116
-
-
OpenSSL Project. Openssl. http://www.openssl.org.
-
Openssl
-
-
-
17
-
-
85077754630
-
-
RSA Press Release. http://www.otn.net/onthenet/rsaqa.htm, 1995.
-
(1995)
RSA Press Release
-
-
-
18
-
-
68549092451
-
A timing attack against RSA with the Chinese remainder theorem
-
Werner Schindler. A timing attack against RSA with the chinese remainder theorem. In CHES 2000, pages 109-124, 2000.
-
(2000)
CHES 2000
, pp. 109-124
-
-
Schindler, W.1
-
19
-
-
84958960266
-
A combined timing and power attack
-
Werner Schindler. A combined timing and power attack. Lecture Notes in Computer Science, 2274:263-279, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2274
, pp. 263-279
-
-
Schindler, W.1
-
20
-
-
84983436061
-
Optimized timing attacks against public key cryptosystems
-
Werner Schindler. Optimized timing attacks against public key cryptosystems. Statistics and Decisions, 20:191-210, 2002.
-
(2002)
Statistics and Decisions
, vol.20
, pp. 191-210
-
-
Schindler, W.1
-
21
-
-
84946828535
-
Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies
-
Werner Schindler, Franois Koeune, and JeanJacques Quisquater. Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies. Lecture Notes in Computer Science, 2260:245-267, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2260
, pp. 245-267
-
-
Schindler, W.1
Koeune, F.2
Quisquater Jean, J.3
-
23
-
-
85077746469
-
-
Stunnel Project. stunnel. http://www.stunnel.org.
-
Stunnel
-
-
|