Cryptography Reference
In-Depth Information
75. BSI: Application of attack potential to smartcards. Supporting Document, version 2.7,
revision 1 (2009)
76. Burwick, C., Coppersmith, D., D'Avignon, E., Gennaro, R., Halevi, S., Jutla, C., Matyas Jr.,
S.M., O'Connor, L., Peyravian, M., Safford, D., Zunic, N.: MARS—a candidate cipher for
AES (1999). http://www.research.ibm.com/security/mars.pdf
77. Cadence
Corporation:
SoC
encounter.
http://www.cadence.com/products/di/soc_
encounter/pages/default.aspx
78. Callaghan, B., Pawlowski, B., Staubach, P.: NFS version 3 protocol specification. RFC 1813
(1995). http://tools.ietf.org/html/rfc1813
79. Canivet, G., Clédière, J., Ferron, J.B., Valette, F., Renaudin, M., Leveugle, R.: Detailed
analyses of single laser shot effects in the configuration of a Virtex-II FPGA. In: 14th IEEE
International On-Line Testing Symposium (IOLTS 2008), pp. 289-294. IEEE Comput. Soc.
(2008)
80. Carlet, C., Ding, C.: Highly nonlinear mappings. J. Complex. 20(2/3), 205-244 (2004)
81. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards approaches to counteract power-
analysis attacks. In: M.J. Wiener (ed.) Advances in Cryptology—CRYPTO '99. Lecture
Notes in Computer Science, vol. 1666, pp. 398-412. Springer, Berlin (1999)
82. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., et al. 208, pp. 13-28
83. Chelton, W.N., Benaissa, M.: Concurrent error detection in GF ð 2 m Þ multiplication and its
application in elliptic curve cryptography. IET Circuits, Devices and Syst. 2(3), 289-297
(2008)
84. Chen, C.N., Yen, S.M.: Differential fault analysis on AES key schedule and some
countermeasures. In: R. Safavi-Naini, J. Seberry (eds.) Information Security and Privacy
(ACISP 2003), Lecture Notes in Computer Science, vol. 2727, pp. 118-129. Springer,
Heidelberg (2003)
85. Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-
channel analysis: Side-channel atomicity. IEEE Transac. Comput. 53(6), 760-768 (2004)
86. Chiou, C.W., Chang, C.C., Lee, C.Y., Hou, T.W., Lin, J.M.: Concurrent error detection and
correction in Gaussian normal basis multiplier over GF ð 2 m Þ . IEEE Transac. Comput. 58(6),
851-857 (2009)
87. Chiou, C.W., Lee, C.Y., Deng, A.W., Lin, J.M.: Concurrent error detection in Montgomery
multiplication over GF ð 2 m Þ . IEICE Transac. Fundam. Electron. Commun. Comput. Sci.
89(A(2), 566-579 (2006)
88. Chodowiec, P., Gaj, K.: Very compact FPGA implementation of the AES algorithm. In:
Walter., et al., vol. 411, pp. 319-333
89. Choukri, H., Tunstall, M.: Round reduction using faults. In: Breveglieri and Koren, I. , vol.
68, pp. 13-24
90. Ciet, M., Joye, M.: Elliptic curve cryptosystems in the presence of permanent and transient
faults. Des. Codes and Cryptogr. 36(1), 33-43 (2005)
91. Ciet, M., Joye, M.: Practical fault countermeasures for Chinese Remaindering based RSA.
In: Breveglieri and Koren, I. , vol. 68, pp. 124-132
92. Clavier, C.: De la sécurité des cryptosystèmes embarqués. Ph.D. thesis, Université de
Versailles Saint-Quentin-en-Yvelines (2007)
93. Clavier, C.: Secret external encodings do not prevent transient fault analysis. In: Paillier and
Verbauwhede vol. 319, pp. 181-194
94. Clavier, C., Feix, B., Gagnerot, G., Roussellet, M.: Passive and active combined attacks on
AES. In: Breveglieri, L., et al., vol. 67, pp. 10-19
95. Clavier, C., Gaj, K. (eds.): Cryptographic Hardware and Embedded Systems—CHES 2009,
Lecture Notes in Computer Science, vol. 5747. Springer, Berlin (2009)
96. Codesourcery: GNU toolchain for ARM processors (2009). http://www.codesourcery.com/
sgpp/lite/arm
97. Cohen, H.: A Course in Computational Algebraic Number Theory, Graduate Texts in
Mathematics, vol. 138. Springer, Berlin (1993)
Search WWH ::




Custom Search