Cryptography on smart cards
暂无分享,去创建一个
[1] Bart Preneel,et al. Cryptographic Primitives for Information Authentication - State of the Art , 1997, State of the Art in Applied Cryptography.
[2] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[3] Peter K. Pearson,et al. IPA: A New Class of Power Attacks , 1999, CHES.
[4] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[5] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[6] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[7] Bart Preneel,et al. MacDES: MAC algorithm based on DES , 1998 .
[8] Helena Handschuh,et al. Smart Card Crypto-Coprocessors for Public-Key Cryptography , 1998, CARDIS.
[9] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[10] Bart Preneel,et al. On the Security of Iterated Message Authentication Codes , 1999, IEEE Trans. Inf. Theory.
[11] Marc Joye,et al. Chinese Remaindering Based Cryptosystems in the Presence of Faults , 1999, Journal of Cryptology.
[12] Jeff Gilchrist,et al. Factorization of a 512-Bit RSA Modulus , 2000, EUROCRYPT.
[13] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[15] Geoffrey Keating. Performance Analysis of AES candidates on the 6805 CPU core , 1999 .
[16] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[17] Bart Preneel,et al. Fast and Secure Hashing Based on Codes , 1997, CRYPTO.
[18] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[19] Bart Preneel,et al. Key recovery attack on ANSI X9.19 retail MAC , 1996 .
[20] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[21] James L. Massey,et al. SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm , 1993, FSE.
[22] R. C. Fairfield,et al. An LSI Random Number Generator (RNG) , 1985, CRYPTO.
[23] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[24] Chris J. Mitchell,et al. Key Recovery and Forgery Attacks on the MacDES MAC Algorithm , 2000, CRYPTO.
[25] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.