Using Compilers to Enhance Cryptographic Product Development
暂无分享,去创建一个
Ivan Damgård | Ahmad-Reza Sadeghi | Manuel Barbosa | Dan Page | Endre Bangerter | Jakob Illeborg Pagter | D. Bernstein | S. Sovio
[1] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[2] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[3] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[4] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[5] Yehuda Lindell,et al. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.
[6] Ivan Damgård,et al. Multiparty Computation Goes Live , 2008, IACR Cryptol. ePrint Arch..
[7] Adi Shamir,et al. Factoring Large Number with the TWIRL Device , 2003, CRYPTO.
[8] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[9] Marc Joye,et al. Securing OpenSSL against Micro-Architectural Attacks , 2007, SECRYPT.
[10] Bart Jacobs,et al. Dismantling MIFARE Classic , 2008, ESORICS.
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] Onur Aciiçmez,et al. Predicting Secret Keys Via Branch Prediction , 2007, CT-RSA.
[13] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[14] Jan Camenisch,et al. Design and implementation of theidemixanonymous credential system , 2002, CCS 2002.
[15] Phong Q. Nguyen. Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 , 2004, EUROCRYPT.
[16] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.