Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems
- 1 January 2000
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Differential Cryptanalysis of the Full 16-round DESPublished by Springer Nature ,2001
- CM-Curves with Good Cryptographic PropertiesPublished by Springer Nature ,2001
- Differential Power AnalysisPublished by Springer Nature ,1999
- Resistance Against Differential Power Analysis For Elliptic Curve CryptosystemsPublished by Springer Nature ,1999
- Power Analysis Attacks of Modular Exponentiation in SmartcardsPublished by Springer Nature ,1999
- On the Importance of Checking Cryptographic Protocols for FaultsPublished by Springer Nature ,1997
- Differential fault analysis of secret key cryptosystemsPublished by Springer Nature ,1997
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsPublished by Springer Nature ,1996
- Linear Cryptanalysis Method for DES CipherPublished by Springer Nature ,1994
- Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 1991