共 50 条
- [41] Elliptic Curve Cryptography For EAACK Intrusion Detection System [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 355 - 359
- [43] Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1032 - 1037
- [44] On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography [J]. THEORY OF QUANTUM COMPUTATION, COMMUNICATION, AND CRYPTOGRAPHY, 2008, 5106 : 96 - +
- [45] Implementation of Pollard Rho Attack on Elliptic Curve Cryptography over Binary Fields [J]. 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND NATURAL SCIENCES (ICMNS 2014), 2015, 1677
- [46] Side-channel Attack Countermeasure Based on Power Supply Modulation [J]. 2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 618 - 622
- [47] Side Channel Attack Countermeasure for Low Power Devices with AES Encryption [J]. 2021 IEEE IFAC INTERNATIONAL CONFERENCE ON AUTOMATION/XXIV CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (IEEE IFAC ICA - ACCA2021), 2021,
- [48] Novel Fault Attack Resistant Elliptic Curve Processor Architecture [J]. 2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
- [49] A Novel Approach Cryptography by using Residue Number System [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 636 - 639
- [50] Side-channel aware design:: Algorithms and architectures for elliptic curve cryptography over GF(2n) [J]. 16TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURE AND PROCESSORS, PROCEEDINGS, 2005, : 350 - 355