Pages that link to "Item:Q3452345"
From MaRDI portal
The following pages link to Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (Q3452345):
Displaying 50 items.
- Revisiting prime power RSA (Q260044) (← links)
- Fast cryptography in genus 2 (Q271578) (← links)
- The complexity of synchronous notions of information flow security (Q278742) (← links)
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Integrating security constraints into fixed priority real-time schedulers (Q298053) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Evolutionary ciphers against differential power analysis and differential fault analysis (Q362183) (← links)
- Min-entropy as a resource (Q385717) (← links)
- Scalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithm (Q396590) (← links)
- First-order side channel attacks on Zhang's countermeasures (Q433061) (← links)
- Polar differential power attacks and evaluation (Q439840) (← links)
- Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography (Q445404) (← links)
- A novel elliptic curve scalar multiplication algorithm against power analysis (Q474700) (← links)
- Using quantum key distribution for cryptographic purposes: a survey (Q477173) (← links)
- Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis (Q497571) (← links)
- DES with any reduced masked rounds is not secure against side-channel attacks (Q604102) (← links)
- Weak bisimulation for probabilistic timed automata (Q606996) (← links)
- Locking the sky: a survey on IaaS cloud security (Q644834) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- A low-cost memory remapping scheme for address bus protection (Q666092) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Four-dimensional Gallant-Lambert-Vanstone scalar multiplication (Q744601) (← links)
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding (Q778376) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- Timed hyperproperties (Q821560) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Federated learning in side-channel analysis (Q831663) (← links)
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis (Q881859) (← links)
- The distributions of individual bits in the output of multiplicative operations (Q892279) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks (Q892289) (← links)
- Constructive and destructive use of compilers in elliptic curve cryptography (Q1015356) (← links)
- Quantifying information leakage in process calculi (Q1023286) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Physical attacks and beyond (Q1698608) (← links)
- Uniform first-order threshold implementations (Q1698616) (← links)
- Attacking embedded ECC implementations through CMOV side channels (Q1698620) (← links)
- Lattice attacks against elliptic-curve signatures with blinded scalar multiplication (Q1698621) (← links)
- All the AES you need on Cortex-M3 and M4 (Q1698628) (← links)
- Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors (Q1698669) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Sliding-window correlation attacks against encryption devices with an unstable clock (Q1726674) (← links)
- How to (pre-)compute a ladder -- improving the performance of X25519 and X448 (Q1746965) (← links)
- Quantum key search with side channel advice (Q1746986) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)