|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 684 occurrences of 307 keywords
|
|
|
Results
Found 12148 publication records. Showing 12148 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
104 | Tim Güneysu, Christof Paar |
Ultra High Performance ECC over NIST Primes on Commercial FPGAs. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
FPGA, High-Performance, Elliptic Curve Cryptosystems |
80 | Zhi Li, John Higgins, Mark J. Clement |
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. |
MASCOTS |
2001 |
DBLP DOI BibTeX RDF |
ElGamel, Encryption, Elliptic Curve, normal basis, polynomial basis |
77 | Dong-Ho Lee, Jong-Soo Oh |
Multi-segment GF(2m) multiplication and its application to elliptic curve cryptography. |
ACM Great Lakes Symposium on VLSI |
2007 |
DBLP DOI BibTeX RDF |
elliptic curve scalar multiplication, FPGA, elliptic curve cryptography (ECC), coprocessor, finite field multiplication |
75 | Chris Wilkerson, Alaa R. Alameldeen, Zeshan Chishti, Wei Wu 0024, Dinesh Somasekhar, Shih-Lien Lu |
Reducing cache power with low-cost, multi-bit error-correcting codes. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
ecc, edram, idle power, idle states, multi-bit ecc, refresh power, vccmin, dram |
74 | Shantanu Dutt, Li Li |
Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures. |
ACM Trans. Reconfigurable Technol. Syst. |
2009 |
DBLP DOI BibTeX RDF |
masking probability, parity groups, parity randomization, trust checking, trust-based design, FPGAs, Error-correcting codes |
74 | Guanghui Liu |
ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant Faults. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
74 | Doe Hyun Yoon, Mattan Erez |
Memory mapped ECC: low-cost error protection for last level caches. |
ISCA |
2009 |
DBLP DOI BibTeX RDF |
reliability, error correction, soft error, last-level caches |
70 | Zeshan Chishti, Alaa R. Alameldeen, Chris Wilkerson, Wei Wu 0024, Shih-Lien Lu |
Improving cache lifetime reliability at ultra-low voltages. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
|
70 | Jyu-Yuan Lai, Chih-Tsun Huang |
Elixir: High-Throughput Cost-Effective Dual-Field Processors and the Design Framework for Elliptic Curve Cryptography. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Mun-Kyu Lee, Keon Tae Kim, Howon Kim 0001, Dong Kyue Kim |
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Hans L. Bodlaender |
Dynamic Programming on Graphs with Bounded Treewidth. |
ICALP |
1988 |
DBLP DOI BibTeX RDF |
graph decision problems, restrictions of NP-complete problems, local condition compositions, dynamic programming, polynomial time algorithms, Treewidth, partial k-trees |
67 | Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Christof Paar |
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
comparison HECC vs. ECC, efficient implementation, Hyperelliptic curves, explicit formulae |
64 | Hongbin Sun 0001, Nanning Zheng 0001, Tong Zhang 0002 |
Realization of L2 Cache Defect Tolerance Using Multi-bit ECC. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Yi Wang 0016, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan |
Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Jin-Hee Han, Young-Jin Kim, Sung-Ik Jun, Kyo-Il Chung, Chang-Ho Seo |
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card. |
ICDCS Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
61 | Murat Aydos, Tugrul Yanik, Çetin Kaya Koç |
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications |
60 | Tim Güneysu, Christof Paar, Jan Pelzl |
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. |
ACM Trans. Reconfigurable Technol. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm |
60 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. |
FPGA |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
60 | María-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdán |
A Certification Authority for Elliptic Curve X.509v3 Certificates. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
security, wireless communications, elliptic curve cryptography, digital certificates |
60 | Limin Gu, Yanmei Fang, Jiwu Huang |
Revaluation of Error Correcting Coding in Watermarking Channel. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Yijun Sun, Sinisa Todorovic, Jian Li, Dapeng Wu 0001 |
Unifying the error-correcting and output-code AdaBoost within the margin framework. |
ICML |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Boris Polianskikh, Zeljko Zilic |
Design and Implementation of Error Detection and Correction Circuitry for Multilevel Memory Protection. |
ISMVL |
2002 |
DBLP DOI BibTeX RDF |
|
57 | Selçuk Baktir, Sandeep S. Kumar, Christof Paar, Berk Sunar |
A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
discrete Fourier domain, finite fields, elliptic curve cryptography (ECC), modular multiplication |
54 | Doe Hyun Yoon, Mattan Erez |
Virtualized and flexible ECC for main memory. |
ASPLOS |
2010 |
DBLP DOI BibTeX RDF |
fault tolerance, reliability, error correction, memory systems |
54 | Jin Park, Jeong-Tae Hwang, Young-Chul Kim 0001 |
FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Chin-Lung Su, Yi-Ting Yeh, Cheng-Wen Wu |
An Integrated ECC and Redundancy Repair Scheme for Memory Reliability Enhancement. |
DFT |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Michael Spica, T. M. Mak |
Do We Need Anything More Than Single Bit Error Correction (ECC)? |
MTDT |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vipul Gupta, Leonard Rarick, Shreyas Sundaram |
A Public-Key Cryptographic Processor for RSA and ECC. |
ASAP |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Shahriar Mohammadi, Sanaz Abedi |
ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
biometeric signature, electronic banking, ECC |
53 | Colin D. Walter |
Simple Power Analysis of Unified Code for ECC Double and Add. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication |
50 | Yuanling Hao, Shiwei Ma, Guanghua Chen, Xiaoli Zhang, Hui Chen, Weimin Zeng |
Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
calar multiplication, Elliptic curve cryptography, Sliding-window, Non-adjacent form |
50 | Hai Yan, Zhijie Jerry Shi |
Studying Software Implementations of Elliptic Curve Cryptography. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Francis M. Crowe, Alan Daly, William P. Marnane |
A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Limin Gu, Jiwu Huang, Yun Q. Shi 0001 |
Analysis of the role played by error correcting coding in robust watermarking. |
ISCAS (3) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Nils Gura, Hans Eberle, Sheueling Chang Shantz |
Generic implementations of elliptic curve cryptography using partial reduction. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, modular reduction |
50 | Chin-Chih Chang, Jason Cong |
An efficient approach to multilayer layer assignment with anapplication to via minimization. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1999 |
DBLP DOI BibTeX RDF |
|
48 | An Liu, Peng Ning |
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
TinyECC, ECC, public key cryptography, Wireless sensor network security |
48 | M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas |
New and Improved Architectures for Montgomery Modular Multiplication. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
reconfigurable multiplier, scalable multiplier, RSA, ECC, carry save adders, Montgomery modular multiplication |
48 | Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Superscalar Coprocessor for High-Speed Curve-Based Cryptography. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
curve-based cryptography, HECC, ECC, instruction-level parallelism, scalar multiplication, Superscalar, coprocessor |
48 | Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs |
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design |
48 | Chang Hoon Kim, Soonhak Kwon, Jong Jin Kim, Chun Pyo Hong |
A New Arithmetic Unit in GF(2m) for Reconfigurable Hardware Implementation. |
FPL |
2003 |
DBLP DOI BibTeX RDF |
Finite Field Division, VL, ECC, Finite Field Multiplication |
47 | Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. |
ARC |
2006 |
DBLP DOI BibTeX RDF |
RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation |
47 | Tetsuya Izu, Tsuyoshi Takagi |
Exceptional Procedure Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication |
47 | Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila |
Performance analysis of elliptic curve cryptography for SSL. |
Workshop on Wireless Security |
2002 |
DBLP DOI BibTeX RDF |
secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security |
47 | Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka |
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve |
44 | Xu Guo 0001, Patrick Schaumont |
Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA Based SoC Platform. |
ARC |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Doe Hyun Yoon, Mattan Erez |
Flexible cache error protection using an ECC FIFO. |
SC |
2009 |
DBLP DOI BibTeX RDF |
reliability, error correction, soft error, last-level caches |
44 | Hou Huifang, Kaizhi Huang, Liu Guangqiang |
CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Hamad Alrimeih, Daler N. Rakhmatov |
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
programmable hardware, elliptic-curve cryptography, scalar multiplication, modular arithmetic |
44 | M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas |
A bit-sliced, scalable and unified montgomery multiplier architecture for RSA and ECC. |
VLSI-SoC |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Yi Ouyang 0005, Yun Ling, Anding Zhu |
ECC-Based Fuzzy Clustering Algorithm. |
ICFIE |
2007 |
DBLP DOI BibTeX RDF |
Unsupervised Clustering Methods, Ecommerce Concept, Kmeans, Fuzzy C-means |
44 | Yoo-Jin Baek, Ihor Vasyltsov |
How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Toru Akishita, Tsuyoshi Takagi |
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication |
44 | Guido Bertoni, Luca Breveglieri, Matteo Venturi |
ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Levent Ertaul, Weimin Lu |
ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I). |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang |
An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
|
44 | André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz |
Generic GF(2) Arithmetic in Software and Its Application to ECC. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Dense Field Polynomials, Field Multiplication, Field Reduction, Elliptic Curves, Koblitz Curves, Binary Fields |
43 | JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen |
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Smart card, ECC, Side channel attack, Power analysis attack |
43 | Loren D. Olson |
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves |
42 | Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer |
A Low-Cost ECC Coprocessor for Smartcards. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
multiplicative inverse, digital signature, Elliptic Curve Cryptography (ECC), hardware implementation |
40 | Ruirui C. Huang, G. Edward Suh |
IVEC: off-chip memory integrity protection for both security and reliability. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
security, fault tolerance, reliability, error detection, error correction, memory systems |
40 | Qiaoyan Yu, Paul Ampadu |
Adaptive Error Control for NoC Switch-to-Switch Links in a Variable Noise Environment. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Mehdi Kamal, Somayyeh Koohi, Shaahin Hessabi |
Empirical Analysis of the Dependence of Test Power, Delay, Energy and Fault Coverage on the Architecture of LFSR-Based TPGs. |
DFT |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Avijit Dutta, Nur A. Touba |
Multiple Bit Upset Tolerant Memory Using a Selective Cycle Avoidance Based SEC-DED-DAEC Code. |
VTS |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Haodong Wang, Qun Li 0001 |
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Hans Eberle, Arvinderpal Wander, Nils Gura, Sheueling Chang Shantz, Vipul Gupta |
Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors. |
ASAP |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Haeng-Kon Kim, Tai-Hoon Kim |
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
MSET, F2m, Digital envelope, 3BC algorithm, object component |
40 | Limin Gu, Jiwu Huang, Zewen Chen |
Analysis of the Bounds for Linear Block Codes in Watermark Channel. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Meng Yuan Huang |
Investigation of the efficiency of the elliptic curve cryptosystem for multi-applications smart card. |
KES (1) |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Meng Ao, Stan Z. Li |
Near Infrared Face Based Biometric Key Binding. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
BioHash, Key Binding, NIR Face, Biometric Encryption, ECC |
38 | Robert Szerwinski, Tim Güneysu |
Exploiting the Power of GPUs for Asymmetric Cryptography. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Asymmetric Cryptosystems, Graphics Processing Unit, RSA, ECC, DSA |
38 | Pradeep Kumar Mishra |
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems (Extended Version). |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
EC-operations, comb methods, Jacobian coordinates, sidechannel attacks, sidechannel atomicity, pipelining, ECC, Elliptic Curve Cryptosystems, scalar multiplication, binary methods |
38 | Qibin Sun, Shih-Fu Chang |
A Robust and Secure Media Signature Scheme for JPEG Images. |
J. VLSI Signal Process. |
2005 |
DBLP DOI BibTeX RDF |
content hash, watermarking, digital signature, ECC, image authentication |
38 | Chang Han Kim, Yongtae Kim, Nam Su Chang, IlHwan Park |
Modified Serial Multipliers for Type-IV Gaussian Normal Bases. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
serial multiplier, Finite fields, ECC, Massey-Omura multiplier, Gaussian Normal Basis |
38 | Dong Jin Yang, Chang Han Kim, Young-Ho Park 0001, Yongtae Kim, Jongin Lim 0001 |
Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
Finite fields, ECC, Massey-Omura multiplier, Gaussian Normal Basis |
38 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
38 | Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle |
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
Montgomery’s Multiplication Method, FPGA, RSA, ECC, Public Key Cryptography, systolic array |
38 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-Bit Differential Power Analysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure |
38 | Akhil Shetty, Sen Li, Kameshwar Poolla, Pravin Varaiya |
2018 European Control Conference (ECC) June 12-15, 2018. Limassol, Cyprus Optimal Energy Reserve Procurement. |
ECC |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Manuel Barbosa, Andrew Moss, Dan Page |
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Compilers, Optimisation, Implementation, Elliptic curve cryptography (ECC), Specialisation |
37 | Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
parallel processing, elliptic curve cryptography(ECC), public-key cryptosystem, binary fields |
37 | Manuel Barbosa, Andrew Moss, Dan Page |
Compiler Assisted Elliptic Curve Cryptography. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
Compilers, Optimisation, Implementation, Elliptic Curve Cryptography (ECC), Specialisation |
37 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Improving the Randomized Initial Point Countermeasure Against DPA. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP |
37 | Lejla Batina, Nele Mentens, Bart Preneel, Ingrid Verbauwhede |
Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n). |
ASAP |
2005 |
DBLP DOI BibTeX RDF |
Multiplication in GF(2^n), Systolic array architecture, Montgomery method for point multiplication, Elliptic Curve Cryptography (ECC), Hardware implementation |
37 | Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang |
HESSL (Highly Enhanced Security Socket Layer) Protocol. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
HESSL, F_{2^m } ECC, F_{2^m } HECC, BSB, SSL |
37 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
37 | Jan M. Maciejowski, Mark W. Spong |
Welcome from the presidents of IEEE CSS and EUCA CDC-ECC'05. |
CDC/ECC |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Alfredo Germani, Costanzo Manes, Pasquale Palumbo |
Filtering of Differential Nonlinear Systems via a Carleman Approximation Approach; 44th IEEE Conf. on Decision and Control & European Control Conference (CDC-ECC 2005). |
CDC/ECC |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Stuart E. Schechter, Gabriel H. Loh, Karin Strauss, Doug Burger |
Use ECP, not ECC, for hard failures in resistive memories. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
hard failures, resistive memories, memory, error correction, phase change memory |
34 | Eun-Jun Yoon, Kee-Young Yoo |
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Xu Guo 0001, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede |
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Fan Zhang 0010, Zhijie Jerry Shi |
An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Jin-Fu Li 0001 |
Transparent-Test Methodologies for Random Access Memories Without/With ECC. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Fan Zhang |
Power Analysis Attacks on ECC Randomized Automata. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Vladimir Stojanovic, R. Iris Bahar, Jennifer Dworak, Richard Weiss 0001 |
A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
instruction queue, reliability, error correcting codes |
34 | Feng Qin, Shan Lu 0001, Yuanyuan Zhou 0001 |
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. |
HPCA |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng |
Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Bing Du, Anthony J. Maeder, Miles Moody |
A New Approach for Error Resilience in video Transmission Using ECC. |
VLBV |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Swapnil Pathare, Sukumar Nandi |
Sahnet: a secure system for ad-hoc networking using ecc. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
ad-hoc networks, protocol, ECC |
32 | Jaydeb Bhaumik, Dipanwita Roy Chowdhury |
An Integrated ECC-MAC Based on RS Code. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Nonlinear mixing, ECC-MAC, Error correcting code, Reed-Solomon code, Message authentication code |
Displaying result #1 - #100 of 12148 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|