The SCEAS System
Navigation Menu

Search the dblp DataBase


Paul C. Kocher: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paul C. Kocher
    Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:104-113 [Conf]
  2. Paul C. Kocher, Joshua Jaffe, Benjamin Jun
    Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:388-397 [Conf]
  3. Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan
    Security as a new dimension in embedded system design. [Citation Graph (0, 0)][DBLP]
    DAC, 2004, pp:753-760 [Conf]
  4. Jean-Sébastien Coron, Paul C. Kocher, David Naccache
    Statistics and Secret Leakage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:157-173 [Conf]
  5. Paul C. Kocher
    On Certificate Revocation and Validation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:172-177 [Conf]
  6. Eli Biham, Paul C. Kocher
    A Known Plaintext Attack on the PKZIP Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:144-153 [Conf]
  7. Paul C. Kocher, Bruce Schneier
    Insider risks in elections. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:7, pp:104- [Journal]
  8. Jean-Sébastien Coron, David Naccache, Paul C. Kocher
    Statistics and secret leakage. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:492-508 [Journal]
  9. Srivaths Ravi, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady
    Security in embedded systems: Design challenges. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:461-491 [Journal]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002