Efficient and Secure Public-Key Cryptosystems
Publisher
Birkhäuser Basel
Reference104 articles.
1. C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert, “Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures,” CHES 2002, LNCS 2523, pp.260–275, 2003. 2. L. Adleman and K. McCurley, “Open problems in number theoretic complexity, II” proceedings of ANTS-I, LNCS 877, pp.291–322, 1994. 3. G. Agnew, R. Mullin and S. Vanstone, “An implementation of elliptic curve cryptosystems over F2155,” IEEE Journal on Selected Areas in Communications, vol.11, pp.804–813, 1993. 4. T. Akishita and T. Takagi, “Zero-Value Point Attacks on Elliptic Curve Cryptosystem”, ISC 2003, LNCS2851, pp. 218–233, 2003. 5. D. Boneh and H. Shacham, “Fast Variants of RSA,” CRYPTOBYTES, Vol.5, No.1, pp.1–9, 2002.
|
|