Just a Little Bit More
暂无分享,去创建一个
[1] Igor E. Shparlinski,et al. The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces , 2003, Des. Codes Cryptogr..
[2] Naomi Benger,et al. Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack , 2014, IACR Cryptol. ePrint Arch..
[3] Billy Bob Brumley,et al. Remote Timing Attacks Are Still Practical , 2011, ESORICS.
[4] Mark Stamp,et al. Software Reverse Engineering , 2010, Handbook of Information and Communication Security.
[5] Risto M. Hakala,et al. Cache-Timing Template Attacks , 2009, ASIACRYPT.
[6] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[7] R. Sekar,et al. Address-Space Randomization for Windows Systems , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[8] Daniel M. Gordon,et al. A Survey of Fast Exponentiation Methods , 1998, J. Algorithms.
[9] Dan Boneh,et al. Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes , 1996, CRYPTO.
[10] Nigel P. Smart,et al. Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..
[11] Claus-Peter Schnorr,et al. Lattice basis reduction: Improved practical algorithms and solving subset sum problems , 1991, FCT.
[12] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[13] Nicolas Gama,et al. Lattice Enumeration Using Extreme Pruning , 2010, EUROCRYPT.
[14] Bodo Möller,et al. Improved Techniques for Fast Exponentiation , 2002, ICISC.
[15] Marc Joye,et al. (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography , 2003, ICICS.
[16] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[17] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[18] Igor E. Shparlinski,et al. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces , 2002, Journal of Cryptology.
[19] Bodo Möller,et al. Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks , 2002, ISC.
[20] Naomi Benger,et al. "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way , 2014, CHES.
[21] Benoit Feix,et al. Side-Channel Analysis on Blinded Regular Scalar Multiplications , 2014, INDOCRYPT.
[22] Claus-Peter Schnorr,et al. Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems , 1991, FCT.
[23] J. Solinas. CORR 99-39 Generalized Mersenne Numbers , 1999 .