Is the performance of smart card cryptographic functions the real bottleneck?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Smart Cards in Electronic Commerce
BT Technology Journal
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Increasing the Bitlength of a Crypto-Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Montgomery Multiplication with Twice the Bit-Length of Multipliers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Towards self-authenticable smart cards
Computer Communications
Unbridle the bit-length of a crypto-coprocessor with montgomery multiplication
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Double-size bipartite modular multiplication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Sign change fault attacks on elliptic curve cryptosystems
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Secure and efficient public key management in next generation mobile networks
Personal and Ubiquitous Computing
A HIPAA-compliant key management scheme with revocation of authorization
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |