Cryptography Reference
In-Depth Information
References
1. Adleman, L.M.: On breaking generalized knapsack public key cryptosystems. In: 15th
Annual ACM Symposium on Theory of Computing, pp. 402-412. ACM Press, Boston
(1983)
2. Agilent Technologies: 6633B 100 Watt System Power Supply Datasheet (2006)
http://www.home.agilent.com/upload/cmc_upload/All/663xseries_datasheet_Jan06.pdf
3. Agilent
Technologies:
34420A
NanoVolt,
Micro-Ohm
Meter
Datasheet
(2009).
http://cp.literature.agilent.com/litweb/pdf/5968-9726EN.pdf
4. Agilent
Technologies:
E3631A
80W
Triple
Output
Power
Supply
Datasheet
(2009).
http://cp.literature.agilent.com/litweb/pdf/5968-9726EN.pdf
5. Agoyan, M., Dutertre, J.M., Naccache, D., Robisson, B., Tria, A.: When clocks fail: On
critical paths and clock faults. In: D. Gollmann, J.L. Lanet, J. Iguchi-Cartigny (eds.) Smart
Card Research and Advanced Applications (CARDIS 2010). Lecture Notes in Computer
Science, vol. 6035, pp. 182-193. Springer (2010)
6. Ajtai, M.: Random lattices and a conjectured 0-1 law about their polynomial time
computable properties. In: 43rd Symposium on Foundations of Computer Science (FOCS
2002), pp. 733-742. IEEE Comput. Soc. (2002)
7. Ajtai, M.: Generating random lattices according to the invariant distribution (2006). Draft
8. Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector
problem. In: 33rd Annual ACM Symposium on Theory of Computing, pp. 601-610. ACM
Press (2001)
9. Akdemir, K.D., Karakoyunlu, D., Sunar, B.: Nonlinear error detection for elliptic curve
cryptosystems (2010). Preprint
10. Akdemir, K.D., Sunar, B.: Generic approach for hardening state machines against strong
adversaries. IET Comput. Digit. Tech. 4(6), 458-470 (2010)
11. Akkar, M.L., Bevan, R., Goubin, L.: Two power analysis attacks against one-mask methods.
In: Roy, B.K.., Meier, W. (eds.) Fast Software Encryption (FSE 2004). Lecture Notes in
Computer Science, vol. 3017, pp. 332-347. Springer (2004)
12. Amiel, F., Clavier, C., Tunstall, M.: Fault analysis of DPA-resistant algorithms. In:
Breveglieri, L., et al. vol. 69, pp. 223-236
13. Anderson, R., Biham, E., Knudsen, L.: Serpent: A proposal for the Advanced Encryption
Standard (1998). http://www.cl.cam.ac.uk/rja14/Papers/serpent.pdf
14. Anderson, R.J., Kuhn, M.G.: Tamper resistance—a cautionary note. In: 2nd USENIX
Workshop on Electronic Commerce, pp. 1-11. USENIX Association (1996)
15. Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: B.
Christianson, B. Crispo, T.M.A. Lomas, M. Roe (eds.) Security Protocols, Lecture Notes in
Computer Science, vol. 1361, pp. 125-136. Springer (1997)
Search WWH ::




Custom Search