Search the dblp DataBase
Paul C. Kocher :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Paul C. Kocher Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:104-113 [Conf ] Paul C. Kocher , Joshua Jaffe , Benjamin Jun Differential Power Analysis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:388-397 [Conf ] Srivaths Ravi , Paul C. Kocher , Ruby B. Lee , Gary McGraw , Anand Raghunathan Security as a new dimension in embedded system design. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:753-760 [Conf ] Jean-Sébastien Coron , Paul C. Kocher , David Naccache Statistics and Secret Leakage. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:157-173 [Conf ] Paul C. Kocher On Certificate Revocation and Validation. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:172-177 [Conf ] Eli Biham , Paul C. Kocher A Known Plaintext Attack on the PKZIP Stream Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:144-153 [Conf ] Paul C. Kocher , Bruce Schneier Insider risks in elections. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:7, pp:104- [Journal ] Jean-Sébastien Coron , David Naccache , Paul C. Kocher Statistics and secret leakage. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:492-508 [Journal ] Srivaths Ravi , Anand Raghunathan , Paul C. Kocher , Sunil Hattangady Security in embedded systems: Design challenges. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:461-491 [Journal ] Search in 0.004secs, Finished in 0.005secs