Attacks and countermeasures on AES and ECC
暂无分享,去创建一个
[1] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[2] Michael Rosing,et al. Implementing elliptic curve cryptography , 1998 .
[3] Dan Forsberg,et al. LTE Security , 2010 .
[4] Y. Shidama,et al. Formal Verification of AES Using the Mizar Proof Checker , 2011 .
[5] Alex Biryukov,et al. Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds , 2010, IACR Cryptol. ePrint Arch..
[6] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[7] Samant Khajuria,et al. Implementation of Diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[8] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.