-
1
-
-
33745470162
-
-
ARM, August, Document number: ARM DDI 0029E
-
ARM. ARM 7TDMI Data Sheet, August 1995. Document number: ARM DDI 0029E.
-
(1995)
ARM 7TDMI Data Sheet
-
-
-
3
-
-
85034497704
-
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor
-
A. M. Odlyzko, editor, Advances in Cryptology, CRYPTO '86, of, Springer-Verlag
-
P. Barrett. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In A. M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of LNCS, pages 311-323. Springer-Verlag, 1987.
-
(1987)
LNCS
, vol.263
, pp. 311-323
-
-
Barrett, P.1
-
5
-
-
27544466109
-
A Practical Implementation of the Timing Attack
-
CARDIS '98, Springer-Verlag, to appear
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, and J.-L. Willems. A Practical Implementation of the Timing Attack. In CARDIS '98, LNCS. Springer-Verlag, 1998. to appear.
-
(1998)
LNCS
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
8
-
-
0027606916
-
Hardware Implementation of Montgomery's Modular Multiplication Algorithm
-
June
-
Stephen E. Eldridge and Colin D. Walter. Hardware Implementation of Montgomery's Modular Multiplication Algorithm. IEEE Transactions on Computers, 42(6):693-699, June 1993.
-
(1993)
IEEE Transactions on Computers
, vol.42
, Issue.6
, pp. 693-699
-
-
Eldridge, S.E.1
Walter, C.D.2
-
9
-
-
0038800541
-
Timing Attack: What Can Be Achieved by a Powerful Adversary?
-
A. Barbé, E.C. van der Meulen, and P. Vanroose, editors, May
-
Gael Hachez, François Koeune, and Jean-Jacques Quisquater. Timing Attack: What Can Be Achieved by a Powerful Adversary? In A. Barbé, E.C. van der Meulen, and P. Vanroose, editors, The 20th symposium on Information Theory in the Benelux, pages 63-70, May 1999.
-
(1999)
The 20th symposium on Information Theory in the Benelux
, pp. 63-70
-
-
Hachez, G.1
Koeune, F.2
Quisquater, J.-J.3
-
10
-
-
84949515158
-
-
Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, and Yasushi Kurihara. Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, 1717 of LNCS, pages 61-72. Springer-Verlag, August 1999.
-
Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, and Yasushi Kurihara. Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, volume 1717 of LNCS, pages 61-72. Springer-Verlag, August 1999.
-
-
-
-
11
-
-
84943632039
-
Timing Attack on Implementations of Diffe-Hellman, RSA, DSS and other systems
-
Neil Kobliz, editor, Advances in Cryptology, CRYPTO '96, of, Springer-Verlag, August
-
Paul Kocher. Timing Attack on Implementations of Diffe-Hellman, RSA, DSS and other systems. In Neil Kobliz, editor, Advances in Cryptology - CRYPTO '96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, August 1996.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
12
-
-
84939573910
-
Differential Power Analysis
-
M. Wiener, editor, Advances in Cryptology, CRYPTO '99, of, Springer-Verlag, August
-
Paul Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 388-397. Springer-Verlag, August 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
13
-
-
84949514743
-
Power analysis Attack of Modular Exponentiation in Smartcards
-
Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems, CHES '99, of, Springer-Verlag, August
-
Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. Power analysis Attack of Modular Exponentiation in Smartcards. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, volume 1717 of LNCS, pages 144-157. Springer-Verlag, August 1999.
-
(1999)
LNCS
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
14
-
-
84966243285
-
Modular Multiplication Without Trial Division
-
April
-
Peter L. Montgomery. Modular Multiplication Without Trial Division. Mathematics of Computation, 44(170):519-521, April 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
15
-
-
68549130910
-
-
Jean-Jacques Quisquater. Procédé de Codage selon la Méthode dite RSA, par unMicrocontr^oleur et Dispositifs Utilisant ce Procédé. Demande de brevet français.(Dépǒt numéro: 90 02274), February 1990.
-
Jean-Jacques Quisquater. Procédé de Codage selon la Méthode dite RSA, par unMicrocontr^oleur et Dispositifs Utilisant ce Procédé. Demande de brevet français.(Dépǒt numéro: 90 02274), February 1990.
-
-
-
-
16
-
-
27244438216
-
Encoding System According to the So-called RSA Method, by Means of a Microcontroller and Arrangement Implementing this System
-
U.S. Patent 5,166,978, November
-
Jean-Jacques Quisquater. Encoding System According to the So-called RSA Method, by Means of a Microcontroller and Arrangement Implementing this System. U.S. Patent 5,166,978, November 1992.
-
(1992)
-
-
Quisquater, J.-J.1
-
17
-
-
0033204468
-
Needs no Final Subtractions
-
October
-
Colin D. Walter. Montgomery Exponentiation Needs no Final Subtractions. Electronics Letters, 35(21):1831-1832, October 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Walter, C.D.1
Exponentiation, M.2
-
18
-
-
84949504956
-
Montgomery's Multiplication Technique: How to Make It Smaller and Faster
-
Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems, CHES '99, of, Springer-Verlag, August
-
Colin D. Walter. Montgomery's Multiplication Technique: How to Make It Smaller and Faster. In Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES '99, volume 1717 of LNCS, pages 80-93. Springer-Verlag, August 1999.
-
(1999)
LNCS
, vol.1717
, pp. 80-93
-
-
Walter, C.D.1
|