|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 666 occurrences of 255 keywords
|
|
|
Results
Found 627 publication records. Showing 627 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm |
Templates as Master Keys. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sergei P. Skorobogatov |
Data Remanence in Flash Memory Devices. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer |
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | P. J. Green, Richard Noad, Nigel P. Smart |
Further Hidden Markov Model Cryptanalysis. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tim Kerins, William P. Marnane, Emanuel M. Popovici, Paulo S. L. M. Barreto |
Efficient Hardware for the Tate Pairing Calculation in Characteristic Three. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
tower fields, hardware accelerator, Tate pairing, characteristic three |
1 | Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet |
The "Backend Duplication" Method. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
secured backend, differential signals, Information leakage |
1 | Marcelo E. Kaihara, Naofumi Takagi |
Bipartite Modular Multiplication. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Catherine H. Gebotys, Simon Ho, C. C. Tiu |
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lejla Batina, David Hwang 0001, Alireza Hodjat, Bart Preneel, Ingrid Verbauwhede |
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
HECC, genus 2 curves, embedded implementation, hardware/software co- design |
1 | Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald |
Successfully Attacking Masked AES Hardware Implementations. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Martin Seysen |
Using an RSA Accelerator for Modular Inversion. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Smart card coprocessor, Euclidean algorithm, modular inversion |
1 | Thomas Popp, Stefan Mangard |
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic, DPA, Side-Channel Analysis |
1 | David Canright |
A Very Compact S-Box for AES. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Kühn 0001, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble |
Secure Data Management in Trusted Computing. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Berk Sunar, David Cyganski |
Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Horner’s method, word level, finite fields, multivariate polynomials, polynomial evaluation |
1 | Werner Schindler, Kerstin Lemke, Christof Paar |
A Stochastic Model for Differential Side Channel Cryptanalysis. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis |
1 | Marc Joye, Pascal Paillier, Berry Schoenmakers |
On Second-Order Differential Power Analysis. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Laszlo Hars |
Fast Truncated Multiplication for Cryptographic Applications. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Short product, Truncated product, Karatsuba multiplication, Barrett multiplication, Optimization, Cryptography, Computer Arithmetic, Montgomery multiplication, Modular multiplication, RSA cryptosystem |
1 | Wieland Fischer, Berndt M. Gammel |
Masking at Gate Level in the Presence of Glitches. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches |
1 | Marco Bucci, Raimondo Luzzi |
Design of Testable Random Bit Generators. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | William Dupuy, Sébastien Kunz-Jacques |
Resistance of Randomized Projective Coordinates Against Power Analysis. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Philipp Grabher, Dan Page |
Hardware Acceleration of the Tate Pairing in Characteristic Three. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
FPGA, Elliptic Curve, Pairing, Identity Based Encryption |
1 | Huiyun Li, A. Theodore Markettos, Simon W. Moore |
Security Evaluation Against Electromagnetic Analysis at Design Time. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
EM side-channel analysis, design time security evaluation, smart card |
1 | Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke |
SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
GNFS, lattice sieving, RSA 1024 bit, Integer factorization, special hardware |
1 | Ludger Hemme |
A Differential Fault Attack Against Early Rounds of (Triple-)DES. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye, Jean-Jacques Quisquater (eds.) |
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Holger Bock, Marco Bucci, Raimondo Luzzi |
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Random bit source, entropy, jitter, random numbers, ring oscillators |
1 | Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette |
Defeating Countermeasures Based on Randomized BSD Representations. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Erdinç Öztürk, Berk Sunar, Erkay Savas |
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kerstin Lemke, Kai Schramm, Christof Paar |
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6 |
1 | Peter James Leadbitter, Dan Page, Nigel P. Smart |
Attacking DSA Under a Repeated Bits Assumption. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Pradeep Kumar Mishra |
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Jacobian coordinates, pipelining, Elliptic curve cryptosystems, scalar multiplication |
1 | Nikhil Joshi, Kaijie Wu 0001, Ramesh Karri |
Concurrent Error Detection Schemes for Involution Ciphers. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Involutional ciphers, KHAZAD, Fault Tolerance, Concurrent Error Detection (CED) |
1 | Yasuyuki Sakai, Kouichi Sakurai |
A New Attack with Side Channel Leakage During Exponent Recoding Computations. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems |
1 | Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer |
A Low-Cost ECC Coprocessor for Smartcards. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
multiplicative inverse, digital signature, Elliptic Curve Cryptography (ECC), hardware implementation |
1 | Olaf Neiße, Jürgen Pulkus |
Switching Blindings with a View Towards IDEA. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Laszlo Hars |
Long Modular Multiplication for Cryptographic Applications. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Quisquater multiplication, multiply-accumulate architecture, optimization, cryptography, Computer arithmetic, Montgomery multiplication, reciprocal, modular multiplication, Modular reduction |
1 | Eric Brier, Christophe Clavier, Francis Olivier |
Correlation Power Analysis with a Leakage Model. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Correlation factor, secure cryptographic device, AES, DPA, power analysis, DES, Hamming distance, side channel, CPA |
1 | Eric Peeters, Michael Neve, Mathieu Ciet |
XTR Implementation on Reconfigurable Hardware. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Maria Avanzi |
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
internal collisions, AES, side channel attacks, birthday paradox |
1 | Marc Girault, David Lefranc |
Public Key Authentication with One (Online) Single Addition. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen |
TTS: High-Speed Signatures on a Low-Cost Smart Card. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
8051, smart card, finite field, Multivariate public-key cryptosystem |
1 | Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz |
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Johann Großschädl, Erkay Savas |
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2m). |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Loren D. Olson |
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves |
1 | Danil Sokolov, Julian P. Murphy, Alexandre V. Bystrov, Alexandre Yakovlev |
Improving the Security of Dual-Rail Circuits. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
1 | Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval |
How to Disembed a Program? |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia |
Leak Resistant Arithmetic. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
RNS Montgomery multiplication, Side channel attacks, residue number systems |
1 | Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong |
Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
finite field, elliptic curve cryptography, Massey-Omura multiplier, Gaussian normal basis, critical path delay |
1 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
1 | Jonathan J. Hoch, Adi Shamir |
Fault Analysis of Stream Ciphers. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4 |
1 | Colin D. Walter |
Simple Power Analysis of Unified Code for ECC Double and Add. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication |
1 | Jason Waddle, David A. Wagner 0001 |
Towards Efficient Second-Order Power Analysis. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Ledig, Frédéric Muller, Frédéric Valette |
Enhancing Collision Attacks. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | François-Xavier Standaert, Siddika Berna Örs, Bart Preneel |
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jolyon Clulow |
On the Security of PKCS#11. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ramesh Karri, Grigori Kuznetsov, Michael Gössel |
Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Akashi Satoh, Sumio Morioka |
Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor |
Security Evaluation of Asynchronous Circuits. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Dual-Rail encoding, EMA, Design-time security evaluation, Asynchronous circuits, Power Analysis, Fault Analysis |
1 | Benoît Chevallier-Mames, Marc Joye, Pascal Paillier |
Faster Double-Size Modular Multiplication from Euclidean Multipliers. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi |
Cryptanalysis of DES Implemented on Computers with Cache. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Markus Dichtl |
How to Predict the Output of a Hardware Random Number Generator. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Entropy, Linear Feedback Shift Register, Random Number Generator, Cellular Automaton |
1 | Kris Tiri, Ingrid Verbauwhede |
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi |
Multi-channel Attacks. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA |
1 | Pawel Chodowiec, Kris Gaj |
Very Compact FPGA Implementation of the AES Algorithm. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Christof Paar |
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
comparison HECC vs. ECC, efficient implementation, Hyperelliptic curves, explicit formulae |
1 | Katsuyuki Okeya, Tsuyoshi Takagi |
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint |
1 | Frank Stajano |
The Security Challenges of Ubiquitous Computing. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Michael Epstein, Laszlo Hars, Raymond Krasinski, Martin Rosner, Hao Zheng |
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Nigel P. Smart |
An Analysis of Goubin's Refined Power Analysis Attack. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, Alexei Tchulkine |
A New Algorithm for Switching from Arithmetic to Boolean Masking. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Arash Reyhani-Masoleh, M. Anwarul Hasan |
On Low Complexity Bit Parallel Polynomial Basis Multipliers. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Finite or Galois field, Mastrovito multiplier, pentanomial, trinomial and equally-spaced polynomial, polynomial basis |
1 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Attacking Unbalanced RSA-CRT Using SPA. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-Bit Differential Power Analysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure |
1 | Colin D. Walter, Çetin Kaya Koç, Christof Paar (eds.) |
Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Piret, Jean-Jacques Quisquater |
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Block Ciphers, AES, Side-channel Attacks, Fault Attacks |
1 | Roberto Maria Avanzi |
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves |
1 | Pierre-Alain Fouque, Frédéric Valette |
The Doubling Attack - Why Upwards Is Better than Downwards. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation |
1 | Willi Geiselmann, Rainer Steinwandt |
Hardware to Solve Sparse Systems of Linear Equations over GF(2). |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Chris Karlof, David A. Wagner 0001 |
Hidden Markov Model Cryptanalysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jean-François Dhem |
Efficient Modular Reduction Algorithm in IFq[x] and Its Application to "Left to Right" Modular Multiplication in IF2[x]. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Burton S. Kaliski Jr., Çetin Kaya Koç, Christof Paar (eds.) |
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Boaz Barak, Ronen Shaltiel, Eran Tromer |
True Random Number Generators Secure in a Changing Environment. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-Based Sessions in SSL/TLS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Siddika Berna Örs, Elisabeth Oswald, Bart Preneel |
Power-Analysis Attacks on an FPGA - First Experimental Results. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye, Pascal Paillier |
GCD-Free Algorithms for Computing Modular Inverses. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
RSA key generation, GCD algorithms, embedded software, efficient implementations, prime numbers, Modular inverses |
1 | Julien Cathalo, François Koeune, Jean-Jacques Quisquater |
A New Type of Timing Attack: Application to GPS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes |
1 | Jovan Dj. Golic |
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures |
1 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Efficient Exponentiation for a Class of Finite Fields GF(2 n) Determined by Gauss Periods. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Gauss period, Finite field, exponentiation, optimal normal basis, primitive element |
1 | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 |
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
fast computation, Public key cryptography, differential power analysis, elliptic curve cryptosystem |
1 | Elena Trichina, Antonio Bellezza |
Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Róbert Lórencz |
New Algorithm for Classical Modular Inverse. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Jacques Quisquater |
CHES: Past, Present, and Future. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels |
RFID Systems and Security and Privacy Implications. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
1 | Vlastimil Klíma, Tomás Rosa |
Further Results and Considerations on Side Channel Attacks on RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Klimov, Adi Shamir |
A New Class of Invertible Mappings. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 627 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|