Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

4 results
publicationDateY_i : 2013
Image document

A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards

Michael Lackner , Reinhard Berlach , Wolfgang Raschke , Reinhold Weiss , Christian Steger
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.82-97, ⟨10.1007/978-3-642-38530-8_6⟩
Conference papers hal-01485935v1
Image document

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves

Gerwin Gsenger , Christian Hanser
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers hal-01506564v1
Image document

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

Christian Hanser , Christian Wagner
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers hal-01506561v1
Image document

Modular Architecture for Adaptable Signature-Creation Tools

Vesna Krnjic , Klaus Stranacher , Tobias Kellner , Andreas Fitzek
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Conference papers hal-01490913v1