Cryptography Reference
In-Depth Information
98. Cohen, H., Frey, G. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography,
Discrete Mathematics and Its Applications, vol. 34. Chapman & Hall/CRC (2005)
99. Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed
coordinates. In: K. Ohta, D. Pei (eds.) Advances in Cryptology—ASIACRYPT '98, Lecture
Notes in Computer Science, vol. 1514, pp. 51-65. Springer, Berlin (1998)
100. Common Criteria: http://www.commoncriteriaportal.org/
101. Coppersmith,
D.:
Small
solutions
to
polynomial
equations,
and
low
exponent
RSA
vulnerabilities. J. Cryptol. 10(4), 233-260 (1997)
102. Coron, J.S.: Resistance against differential power analysis for elliptic curve cryptosystems.
In: Koç and Paar, vol. 237, pp.292-302
103. Coron, J.S., Giraud, C., Morin, N., Piret, G., Vigilant, D.: Fault attacks and countermeasures
on Vigilant's RSA-CRT algorithm. In: Breveglieri, L., et al., vol.67, pp. 88-96
104. Coron, J.S., Joux, A., Kizhvatov, I., Naccache, D., Paillier, P.: Fault attacks on RSA
signatures with partially unknown messages. In: Clavier and Gaj, vol. 95, pp. 444-456
105. Coron, J.S., Kizhvatov, I.: An efficient method for random delay generation in embedded
software. In: Clavier and Gaj, vol. 95, pp. 156-170
106. Coron, J.S., Mandal, A.: PSS is secure against random fault attacks. In: Matsui, M. (ed.)
Advances in Cryptology—ASIACRYPT 2009, Lecture Notes in Computer Science, vol.
5912, pp. 653-666. Springer (2009)
107. Coron, J.S., Naccache, D., Stern, J.P.: On the security of RSA padding. In: Wiener, M.J.,
(ed.) Advances in Cryptology—CRYPTO '99, Lecture Notes in Computer Science, vol.
1666, pp. 1-18. Springer Heidelberg (1999)
108. Coron, J.S., Naccache, D., Tibouchi, M.: Fault attacks against EMV signatures. In:
Pieprzyk, J. (ed.) Topics in Cryptology—CT-RSA 2010, Lecture Notes in Computer
Science, vol. 5985, pp. 208-220. Springer, Heidelberg (2010)
109. Coron, J.S., Naccache, D., Tibouchi, M., Weinmann, R.P.: Practical cryptanalysis of ISO/
IEC 9796-2 and EMV signatures. In: Halevi, S. (ed.) Advances in Cryptology—CRYPTO
2009, Lecture Notes in Computer Science, vol. 5677, pp. 428-444. Springer, Heidelberg
(2009)
110. Coxeter, H.S.M.: The Real Projective Plane, 3rd edn. Springer, New York (1995)
111. Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher Square. In: Biham, E. (ed.) Fast
Software
Encryption
(FSE '97),
Lecture
Notes
in
Computer
Science,
vol.
1267,
pp. 149-165. Springer, Berlin (1997)
112. Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)
113. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Berlin (2002)
114. Danger, J.L., Guilley, S., Bhasin, S., Nassar, M.: Overview of dual rail with precharge logic
styles to thwart implementation-level attacks on hardware cryptoprocessors. In: 3rd
International Conference on Signals, Circuits and Systems (SCS 2009), pp. 1-8. IEEE Press
(2009)
115. Das, S., Roberts, D., Lee, S., Pant, S., Blaauw, D., Austin, T., Flautner, K., Mudge, T.: A
self-tuning DVS processor using delay-error detection and correction. IEEE J. Solid-State
Circuits 41(4), 792-804 (2006)
116. De Cannière, C., Preneel, B.: Trivium. In: Robshaw, M., Billet, O. (eds.) New Stream
Cipher Designs, Lecture Notes in Computer Science, vol. 4986, pp. 244-266. Springer,
Berlin (2008)
117. Debraize, B., Corbella, I.M.: Fault Analysis of the Stream Cipher Snow 3G. In: Breveglieri,
L., et al., vol. 66, pp. 103-110
118. Denk, W.: Das U-boot bootloader (2009). http://www.denx.de/wiki/U-Boot
119. Di Natale, G., Flottes, M.L., Rouzeyre, B.: A novel parity bit scheme for Sbox in AES
circuits. In: P. Girard, A. Krasniewski, E. Gramatová, A. Pawlak, T. Garbolino (eds.) 10th
IEEE Workshop on Design & Diagnostics of Electronic Circuits & Systems (DDECS 2007),
pp. 267-271. IEEE Comput. Soc. (2007)
Search WWH ::




Custom Search