-
2
-
-
8744226456
-
n)
-
B. Macq and J.-J. Quisquater, editors, Louvain-la-Neuve, Belgium, May 29-31 Werkgemeeschap voor Informatie-en-Communicatietheorie, Enschede, The Netherlands
-
n). In B. Macq and J.-J. Quisquater, editors, Proceedings of the 23rd Symposium on Information Theory in the Benelux, pages 61-68, Louvain-la-Neuve, Belgium, May 29-31 2002. Werkgemeeschap voor Informatie-en-Communicatietheorie, Enschede, The Netherlands.
-
(2002)
Proceedings of the 23rd Symposium on Information Theory in the Benelux
, pp. 61-68
-
-
Batina, L.1
Jansen, C.2
Muurling, G.3
Xu, S.4
-
3
-
-
0038638945
-
Hardware architectures for public key cryptography
-
L. Batina, S. B. Örs, B. Preneel, and J. Varidewalle. Hardware architectures for public key cryptography. Eisevier Science Integration the VLSI Journal, 34(1-2): 1-64, 2003.
-
(2003)
Eisevier Science Integration the VLSI Journal
, vol.34
, Issue.1-2
, pp. 1-64
-
-
Batina, L.1
Örs, S.B.2
Preneel, B.3
Varidewalle, J.4
-
7
-
-
22844454852
-
Elliptic curve scalar multiplier design using FPGAs
-
K. Ko and C. Paar, editors, number 1717 in Lecture Notes in Computer Science, pages 257-305, Worcester, MA, USA, August Springer-Verlag
-
L. Gao, S. Shrivastava, and G. E. Sobelman. Elliptic curve scalar multiplier design using FPGAs. In. K. Ko and C. Paar, editors, Proceedings of the 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 1717 in Lecture Notes in Computer Science, pages 257-305, Worcester, MA, USA, August 1999. Springer-Verlag.
-
(1999)
Proceedings of the 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
-
-
Gao, L.1
Shrivastava, S.2
Sobelman, G.E.3
-
8
-
-
0035505389
-
An energy-efficient reconfigurable public-key cryptography processor
-
November
-
J. Goodman and A. P. Chandrakasan. An energy-efficient reconfigurable public-key cryptography processor. IEEE Journal of SolidState Circuits, 36(11):1808-1820, November 2001.
-
(2001)
IEEE Journal of SolidState Circuits
, vol.36
, Issue.11
, pp. 1808-1820
-
-
Goodman, J.1
Chandrakasan, A.P.2
-
9
-
-
11244290996
-
An end-to-end systems approach to elliptic curve cryptography
-
Burt Kaliski Jr., K. Ko, and C. Paar, editors, Lecture Notes in Computer Science, San Francisco Bay (Redwood City), USA, August 13-152002
-
N. Gura, S. C. Shantz, H. Eberle, D. Finchelstein, S. Gupta, V. Gupta, and D. Stebila. An end-to-end systems approach to elliptic curve cryptography. In Burt Kaliski Jr., K. Ko, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Lecture Notes in Computer Science, San Francisco Bay (Redwood City), USA, August 13-152002.
-
Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
-
-
Gura, N.1
Shantz, S.C.2
Eberle, H.3
Finchelstein, D.4
Gupta, S.5
Gupta, V.6
Stebila, D.7
-
10
-
-
0000112683
-
Elliptic curve cryptosystem
-
N. Koblitz. Elliptic curve cryptosystem. Math. Comp., 48:203-209, 1987.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
11
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, A. Menezes, and S. Vanstone. The state of elliptic curve cryptography. Designs, Codes and Cryptography, 19:173193, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
12
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, number 1666 in Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 15-19 Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO'99, number 1666 in Lecture Notes in Computer Science, pages 388-397, Santa Barbara, CA, USA, August 15-19 1999. Springer-Verlag.
-
(1999)
Advances in Cryptology: Proceedings of CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
14
-
-
0036566408
-
Examining smartcard security under the threat of power analysis attacks
-
May
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5):541-552, May 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
15
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
H. C. Williams, editor, number 218 in Lecture Notes in Computer Science, Springer-Verlag
-
V. Miller. Uses of elliptic curves in cryptography. In H. C. Williams, editor, Advances in Cryptology: Proceedings of CRYPTO'85, number 218 in Lecture Notes in Computer Science, pages 417-426. Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology: Proceedings of CRYPTO'85
, pp. 417-426
-
-
Miller, V.1
-
16
-
-
84966243285
-
Modular multiplication without trial division
-
P. Montgomery. Modular multiplication without trial division. Mathematics of Computation, Vol. 44:519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, pp. 519-521
-
-
Montgomery, P.1
-
17
-
-
68549097842
-
m)
-
K. Ko and C. Paar, editors, number 1965 in Lecture Notes in Computer Science, Worcester, Massachusetts, USA, August 17-18 Springer-Verlag
-
m). In. K. Ko and C. Paar, editors, Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES), number 1965 in Lecture Notes in Computer Science, pages 41-56, Worcester, Massachusetts, USA, August 17-18 2000. Springer-Verlag.
-
(2000)
Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES)
, pp. 41-56
-
-
Orlando, G.1
Paar, C.2
-
19
-
-
35248847436
-
Power-analysis attacks on an FPGA - First experimental results
-
C. Walter, K. Ko, and C. Paar, editors, number 2779 in Lecture Notes in Computer Science, Cologne, Germany, September 7-10 Springer-Verlag
-
S. B. Örs, E. Oswald, and B. Preneel. Power-analysis attacks on an FPGA - first experimental results. In C. Walter. K. Ko, and C. Paar, editors, Proceedings of 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2779 in Lecture Notes in Computer Science, pages 35-50, Cologne, Germany, September 7-10 2003. Springer-Verlag.
-
(2003)
Proceedings of 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 35-50
-
-
Örs, S.B.1
Oswald, E.2
Preneel, B.3
-
21
-
-
8744297901
-
A hardware implementation of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field
-
Technical University Eindhoven
-
M. J. Potgieter. A hardware implementation of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field. Final report of project EPR400, Technical University Eindhoven, 2002.
-
(2002)
Final Report of Project EPR400
-
-
Potgieter, M.J.1
|