Cryptography Reference
In-Depth Information
16. Antipa, A., Brown, D.R.L., Menezes, A., Struik, R., Vanstone, S.A.: Validation of elliptic
curve public keys. In: Y. Desmedt (ed.) Public Key Cryptography PKC 2003. Lecture
Notes in Computer Science, vol. 2567, pp. 211-223. Springer (2003)
17. ARM Limited: ARM9 family of general-purpose microprocessors. ARM926EJ-S Technical
Reference Manual (2008). http://infocenter.arm.com/help/topic/com.arm.doc.ddi0
198e/DDI0198E_arm926ejs_r0p5_trm.pdf
18. Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault attacks on RSA with
CRT: Concrete results and practical countermeasures. In: Kaliski Jr.., et al. vol. 208,
pp. 260-275
19. Baek, Y.J., Vasyltsov, I.: How to prevent DPA and fault attack in a unified way for ECC
scalar multiplication: Ring extension method. In: E. Dawson, D.S. Wong (eds.) Information
Security Practice and Experience (ISPEC 2007). Lecture Notes in Computer Science, vol.
4464, pp. 225-237. Springer (2007)
20. Bao, F., Deng, R.H., Han, Y., Jeng, A.B., Narasimhalu, A.D., Ngair, T.H.: Breaking public
key cryptosystems on tamper resistant devices in the presence of transient faults. In: B.
Christianson, B. Crispo, T.M.A. Lomas, M. Roe (eds.) Security Protocols. Lecture Notes in
Computer Science, vol. 1361, pp. 115-124. Springer (1998)
21. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer's apprentice
guide to fault attacks. Proceedings the IEEE 94(2), 370-382 (2006)
22. Barenghi, A., Bertoni, G., Breveglieri, L., Parrinello, E., Pellicioli, M.: Fault attacks against
AES 256 (2010). Early Symmetric Crypto (ESC) seminar, Remich, Luxembourg
23. Barenghi, A., Bertoni, G., Parrinello, E., Pelosi, G.: Low voltage fault attacks on the RSA
cryptosystem. In: Breveglieri, L., et al. vol. 66, pp. 23-31
24. Barenghi, A., Bertoni, G.M., Breveglieri, L., Pellicioli, M., Pelosi, G.: Low voltage fault
attacks to AES. In: Tehranipoor, M., Plusquellic, J. (eds.) IEEE International Workshop on
Hardware-Oriented Security and Trust (HOST 2010), pp. 7-12. IEEE Comput. Soc. (2010)
25. Barreto, P.S., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based
cryptosystems. In: Yung, M. (ed.) Advances in Cryptology—CRYPTO 2002. Lecture Notes
in Computer Science, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
26. Barreto, P.S.L.M., Galbraith, S.D., O'Eigeartaigh, C., Scott, M.: Efficient pairing
computation on supersingular abelian varieties. Des. Codes Cryptogr. 42(3), 239-271
(2007)
27. Barrett, P.D.: Implementing the Rivest Shamir and Adleman public key encryption
algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) Advances in
Cryptology—CRYPTO '86. Lecture Notes in Computer Science, vol. 263, pp. 311-323.
Springer (1987)
28. Bayat-Sarmadi, S., Hasan, M.A.: Concurrent error detection in finite field arithmetic
operations
using
pipelined
and
systolic
architectures.
IEEE
Trans.
Comput.
58(11),
1553-1567 (2009)
29. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient
protocols. In: 1st ACM Conference on Computer and Communications Security (CCS '93),
pp. 62-73. ACM Press (1993)
30. Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) Advances
in
Cryptology—
EUROCRYPT '94.
Lecture
Notes
in
Computer
Science,
vol.
950,
pp. 92-111. Springer, Berlin (1995)
31. Bellare, M., Rogaway, P.: The exact security of digital signatures: How to sign with RSA
and Rabin. In: Advances in Cryptology—EUROCRYPT '96. Lecture Notes in Computer
Science, vol. 1070, pp. 399-416. Springer (1996)
32. Bellcore: New threat model breaks crypto codes. Press release (1996)
33. Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K.
(ed.) Advances in Cryptology—ASIACRYPT 2007. Lecture Notes in Computer Science,
vol. 4833, pp. 29-50. Springer (2007)
Search WWH ::




Custom Search