Theoretical use of cache memory as a cryptanalytic side-channel D Page Cryptology ePrint Archive, 2002 | 423 | 2002 |
Partitioned cache architecture as a side-channel defence mechanism D Page Cryptography ePrint Archive, Report 280, 2005 | 269 | 2005 |
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip J Longo, E De Mulder, D Page, M Tunstall Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 174 | 2015 |
Defending against cache-based side-channel attacks D Page Information Security Technical Report 8 (1), 30-44, 2003 | 141 | 2003 |
A fault attack on pairing-based cryptography D Page, F Vercauteren IEEE Transactions on Computers 55 (9), 1075-1080, 2006 | 129* | 2006 |
On the design and implementation of an efficient DAA scheme L Chen, D Page, NP Smart International Conference on Smart Card Research and Advanced Applications …, 2010 | 128 | 2010 |
High security pairing-based cryptography revisited R Granger, D Page, NP Smart Algorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin …, 2006 | 115 | 2006 |
A comparison of MNT curves and supersingular curves D Page, NP Smart, F Vercauteren Applicable Algebra in Engineering, Communication and Computing 17 (5), 379-392, 2006 | 113 | 2006 |
Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three R Granger, D Page, M Stam IEEE Transactions on Computers 54 (7), 852-860, 2005 | 113 | 2005 |
Hardware implementation of finite fields of characteristic three D Page, NP Smart International Workshop on Cryptographic Hardware and Embedded Systems, 529-539, 2002 | 112 | 2002 |
Compiler assisted masking A Moss, E Oswald, D Page, M Tunstall Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012 | 106 | 2012 |
Toward acceleration of RSA using 3D graphics hardware A Moss, D Page, NP Smart IMA International Conference on Cryptography and Coding, 364-383, 2007 | 103 | 2007 |
On small characteristic algebraic tori in pairing-based cryptography R Granger, D Page, M Stam LMS Journal of Computation and Mathematics 9, 64-85, 2006 | 101 | 2006 |
Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems K Harrison, D Page, NP Smart LMS Journal of Computation and Mathematics 5, 181-193, 2002 | 96 | 2002 |
Side-channel analysis of cryptographic software via early-terminating multiplications J Großschädl, E Oswald, D Page, M Tunstall Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 77 | 2010 |
Instruction stream mutation for non-deterministic processors J Irwin, D Page, NP Smart Proceedings IEEE International Conference on Application-Specific Systems …, 2002 | 75 | 2002 |
Hardware acceleration of the Tate pairing in characteristic three P Grabher, D Page Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005 | 73 | 2005 |
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems R Avanzi, S Hoerder, D Page, M Tunstall Journal of Cryptographic Engineering 1, 271-281, 2011 | 63 | 2011 |
A practical introduction to computer architecture D Page Springer Science & Business Media, 2009 | 59 | 2009 |
On software parallel implementation of cryptographic pairings P Grabher, J Großschädl, D Page International Workshop on Selected Areas in Cryptography, 35-50, 2008 | 57 | 2008 |