Unifier register to protect an efficient modular exponentiation algorithm
-
Published:2016
Issue:
Volume:76
Page:04019
-
ISSN:2261-236X
-
Container-title:MATEC Web of Conferences
-
language:
-
Short-container-title:MATEC Web Conf.
Author:
Varela David Tinoco
Reference28 articles.
1. A method for obtaining digital signatures and public-key cryptosystems
2. Kocher P.. “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems”.InKoblitz N., ed.:Advances in Cryptology-CRYPTO 96,1109of Lecture Notes in Computer Science: 104–113, Springer (1996).
3. Kocher P.C., Jaffe J. and Jun B.. “Differential Power Analysis”. In Wiener M., Ed.:Advances in Cryptology-CRYPTO ‘99.1666of Lecture Notes in Computer Science.Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology: 388–397, Springer (1999).
4. New directions in cryptography
5. Boneh D., DeMillo R. and Lipton R.. “On the importance of checking cryptographic protocols for faults”. In Fumy W., Ed.:Advances in Cryptology-EUROCRYPT’97.1233of Lecture Notes in Computer Science, pages 37–51, Springer (1997).