Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Moreno C, Hasan M and Fischmeister S. Exp-HE. Proceedings of the 12th International Conference on Embedded Software. (157-166).

    /doi/10.5555/2830865.2830883

  • Sugawara T, Suzuki D and Saeki M. Two Operands of Multipliers in Side-Channel Attack. Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064. (64-78).

    https://doi.org/10.1007/978-3-319-21476-4_5

  • Bauer A and Jaulmes É. Correlation Analysis against Protected SFM Implementations of RSA. Proceedings of the 14th International Conference on Progress in Cryptology — INDOCRYPT 2013 - Volume 8250. (98-115).

    https://doi.org/10.1007/978-3-319-03515-4_7

  • Feix B and Venelli A. Defeating with fault injection a combined attack resistant exponentiation. Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design. (32-45).

    https://doi.org/10.1007/978-3-642-40026-1_3

  • Abarzúa R and Thériault N. Complete atomic blocks for elliptic curves in jacobian coordinates over prime fields. Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America. (37-55).

    https://doi.org/10.1007/978-3-642-33481-8_3

  • Clavier C, Feix B, Gagnerot G, Roussellet M and Verneuil V. Square always exponentiation. Proceedings of the 12th international conference on Cryptology in India. (40-57).

    https://doi.org/10.1007/978-3-642-25578-6_5

  • Tunstall M. Random Order m-ary Exponentiation. Proceedings of the 14th Australasian Conference on Information Security and Privacy. (437-451).

    https://doi.org/10.1007/978-3-642-02620-1_30

  • Joye M and Tunstall M. Exponent Recoding and Regular Exponentiation Algorithms. Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology. (334-349).

    https://doi.org/10.1007/978-3-642-02384-2_21