Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4
暂无分享,去创建一个
[1] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[2] Joseph H. Silverman,et al. Optimizations for NTRU , 2001 .
[3] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[4] William Whyte,et al. Choosing Parameters for NTRUEncrypt , 2017, CT-RSA.
[5] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[6] Markus Kasper,et al. The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..
[7] William Whyte,et al. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 , 2005, IACR Cryptol. ePrint Arch..
[8] Sarah Meiklejohn,et al. Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008 , 2010, SIGA.
[9] Joseph H. Silverman,et al. NTRU in Constrained Devices , 2001, CHES.
[10] Dooho Choi,et al. Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] An Wang,et al. Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices , 2017, Comput. Electr. Eng..
[12] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[13] An Wang,et al. First-order collision attack on protected NTRU cryptosystem , 2013, Microprocess. Microsystems.