Filter your results
- 7
- 7
- 7
- 3
- 1
- 2
- 4
- 7
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Cryptanalysis of a SIP Authentication Scheme12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers
hal-01596196v1
|
||
|
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers
hal-01573313v1
|
||
|
Evaluating 16-Bit Processors for Elliptic Curve Cryptography10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.166-181, ⟨10.1007/978-3-642-27257-8_11⟩
Conference papers
hal-01596311v1
|
||
|
A Pre-processing Composition for Secret Key Recovery on Android Smartphone8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.76-91, ⟨10.1007/978-3-662-43826-8_6⟩
Conference papers
hal-01400921v1
|
||
|
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.205-219, ⟨10.1007/978-3-642-23300-5_16⟩
Conference papers
hal-01590400v1
|
||
|
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.34-49, ⟨10.1007/978-3-642-38530-8_3⟩
Conference papers
hal-01485932v1
|