BibTeX records: Colin D. Walter

download as .bib file

@article{DBLP:journals/iacr/Walter17,
  author       = {Colin D. Walter},
  title        = {The Montgomery and Joye Powering Ladders are Dual},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1081},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Walter17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Walter17a,
  author       = {Colin D. Walter},
  title        = {Hardware Aspects of Montgomery Modular Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1115},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Walter17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/MsgnaW14,
  author       = {Mehari G. Msgna and
                  Colin D. Walter},
  editor       = {Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {An Overview of {PIC} Microcontrollers and Their Suitability for Cryptographic
                  Algorithms},
  booktitle    = {Secure Smart Embedded Devices, Platforms and Applications},
  pages        = {475--495},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7915-4\_21},
  doi          = {10.1007/978-1-4614-7915-4\_21},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/MsgnaW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SaeedBW13,
  author       = {Muhammad Qasim Saeed and
                  Zeeshan Bilal and
                  Colin D. Walter},
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {An {NFC} based consumer-level counterfeit detection framework},
  booktitle    = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  pages        = {135--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PST.2013.6596047},
  doi          = {10.1109/PST.2013.6596047},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SaeedBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Walter12,
  author       = {Colin D. Walter},
  editor       = {Orr Dunkelman},
  title        = {A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {84--97},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_6},
  doi          = {10.1007/978-3-642-27954-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Walter12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaeedW12,
  author       = {Muhammad Qasim Saeed and
                  Colin D. Walter},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Off-line {NFC} Tag Authentication},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {730--735},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470914/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/SaeedW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaeedW11,
  author       = {Muhammad Qasim Saeed and
                  Colin D. Walter},
  title        = {A Record Composition/Decomposition attack on the {NDEF} Signature
                  Record Type Definition},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {283--287},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148458/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaeedW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/ContiniKW11,
  author       = {Scott Contini and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Colin D. Walter},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Modular Arithmetic},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {795--798},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_49},
  doi          = {10.1007/978-1-4419-5906-5\_49},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/ContiniKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Walter10,
  author       = {Colin D. Walter},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Fast Scalar Multiplication for {ECC} over GF(\emph{p}) Using Division
                  Chains},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_5},
  doi          = {10.1007/978-3-642-17955-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Walter10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchindlerW09,
  author       = {Werner Schindler and
                  Colin D. Walter},
  editor       = {Matthew Geoffrey Parker},
  title        = {Optimal Recovery of Secret Keys from Weak Side Channel Traces},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {446--468},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_27},
  doi          = {10.1007/978-3-642-10868-6\_27},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/SchindlerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Walter09,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Leakage from Montgomery Multiplication},
  booktitle    = {Cryptographic Engineering},
  pages        = {431--449},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_16},
  doi          = {10.1007/978-0-387-71817-0\_16},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Walter09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Walter09a,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Randomized Exponentiation Algorithms},
  booktitle    = {Cryptographic Engineering},
  pages        = {451--473},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_17},
  doi          = {10.1007/978-0-387-71817-0\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Walter09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter08,
  author       = {Colin D. Walter},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Recovering Secret Keys from Weak Side Channel Traces of Differing
                  Lengths},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_14},
  doi          = {10.1007/978-3-540-85053-3\_14},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Walter07,
  author       = {Colin D. Walter},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Longer Randomly Blinded {RSA} Keys May Be Weaker Than Shorter Ones},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {303--316},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_22},
  doi          = {10.1007/978-3-540-77535-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Walter07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/WalterS05,
  author       = {Colin D. Walter and
                  David Samyde},
  title        = {Data Dependent Power Use in Multipliers},
  booktitle    = {17th {IEEE} Symposium on Computer Arithmetic {(ARITH-17} 2005), 27-29
                  June 2005, Cape Cod, MA, {USA}},
  pages        = {4--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ARITH.2005.14},
  doi          = {10.1109/ARITH.2005.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/WalterS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/ContiniKW05,
  author       = {Scott Contini and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Colin D. Walter},
  editor       = {Henk C. A. van Tilborg},
  title        = {Modular Arithmetic},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_259},
  doi          = {10.1007/0-387-23483-7\_259},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/ContiniKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KocW05,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Colin D. Walter},
  editor       = {Henk C. A. van Tilborg},
  title        = {Montgomery Arithmetic},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_263},
  doi          = {10.1007/0-387-23483-7\_263},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KocW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter04,
  author       = {Colin D. Walter},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Simple Power Analysis of Unified Code for {ECC} Double and Add},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_14},
  doi          = {10.1007/978-3-540-28632-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Walter04,
  author       = {Colin D. Walter},
  editor       = {Tatsuaki Okamoto},
  title        = {Issues of Security with the Oswald-Aigner Exponentiation Algorithm},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {208--221},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_17},
  doi          = {10.1007/978-3-540-24660-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Walter04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/ArnoldBCW03,
  author       = {Mark G. Arnold and
                  Thomas A. Bailey and
                  John R. Cowles and
                  Colin D. Walter},
  title        = {Fast Fourier Transforms Using the Complex Logarithmic Number System},
  journal      = {J. {VLSI} Signal Process.},
  volume       = {33},
  number       = {3},
  pages        = {325--335},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1022236132192},
  doi          = {10.1023/A:1022236132192},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/ArnoldBCW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Walter03,
  author       = {Colin D. Walter},
  editor       = {Marc Joye},
  title        = {Seeing through {MIST} Given a Small Fraction of an {RSA} Private Key},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_27},
  doi          = {10.1007/3-540-36563-X\_27},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Walter03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchindlerW03,
  author       = {Werner Schindler and
                  Colin D. Walter},
  editor       = {Kenneth G. Paterson},
  title        = {More Detail for a Combined Timing and Power Attack against Implementations
                  of {RSA}},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {245--263},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_20},
  doi          = {10.1007/978-3-540-40974-8\_20},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchindlerW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Walter03,
  author       = {Colin D. Walter},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Longer Keys May Facilitate Side Channel Attacks},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {42--57},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_4},
  doi          = {10.1007/978-3-540-24654-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Walter03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2003,
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6},
  doi          = {10.1007/978-3-540-45238-6},
  isbn         = {3-540-40833-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Walter03,
  author       = {Colin D. Walter},
  title        = {Security Constraints on the Oswald-Aigner Exponentiation Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Walter03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Walter02,
  author       = {Colin D. Walter},
  editor       = {Peter Honeyman},
  title        = {Breaking the Liardet-Smart Randomized Exponentiation Algorithm},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  pages        = {59--68},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/cardis02/walter.html},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Walter02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter02,
  author       = {Colin D. Walter},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Some Security Aspects of the {M} {IST} Randomized Exponentiation Algorithm},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {276--290},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_21},
  doi          = {10.1007/3-540-36400-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Walter02,
  author       = {Colin D. Walter},
  editor       = {Bart Preneel},
  title        = {Precise Bounds for Montgomery Modular Multiplication and Some Potentially
                  Insecure {RSA} Moduli},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {30--39},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_3},
  doi          = {10.1007/3-540-45760-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Walter02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Walter02a,
  author       = {Colin D. Walter},
  editor       = {Bart Preneel},
  title        = {{MIST:} An Efficient, Randomized Exponentiation Algorithm for Resisting
                  Power Analysis},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_5},
  doi          = {10.1007/3-540-45760-7\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Walter02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/ArnoldW01,
  author       = {Mark G. Arnold and
                  Colin D. Walter},
  title        = {Unrestricted Faithful Rounding is Good Enough for Some {LNS} Applications},
  booktitle    = {15th {IEEE} Symposium on Computer Arithmetic (Arith-15 2001), 11-17
                  June 2001, Vail, CO, {USA}},
  pages        = {237--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ARITH.2001.930125},
  doi          = {10.1109/ARITH.2001.930125},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/ArnoldW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter01,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Sliding Windows Succumbs to Big Mac Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {286--299},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_24},
  doi          = {10.1007/3-540-44709-1\_24},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Walter01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WalterT01,
  author       = {Colin D. Walter and
                  Susan Thompson},
  editor       = {David Naccache},
  title        = {Distinguishing Exponent Digits by Observing Modular Subtractions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_15},
  doi          = {10.1007/3-540-45353-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WalterT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter00,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Data Integrity in Hardware for Modular Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {204--215},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_15},
  doi          = {10.1007/3-540-44499-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/NedjahWE99,
  author       = {Nadia Nedjah and
                  Colin D. Walter and
                  Stephen E. Eldridge},
  title        = {Efficient Automata-Driven Pattern-Matching for Equational Programs},
  journal      = {Softw. Pract. Exp.},
  volume       = {29},
  number       = {9},
  pages        = {793--813},
  year         = {1999},
  url          = {https://doi.org/10.1002/(SICI)1097-024X(19990725)29:9\&\#60;793::AID-SPE254\&\#62;3.0.CO;2-M},
  doi          = {10.1002/(SICI)1097-024X(19990725)29:9\&\#60;793::AID-SPE254\&\#62;3.0.CO;2-M},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/NedjahWE99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/Walter99,
  author       = {Colin D. Walter},
  title        = {Moduli for Testing Implementations of the {RSA} Cryptosystem},
  booktitle    = {14th {IEEE} Symposium on Computer Arithmetic (Arith-14 '99), 14-16
                  April 1999, Adelaide, Australia},
  pages        = {78--85},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ARITH.1999.762832},
  doi          = {10.1109/ARITH.1999.762832},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/Walter99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter99,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Montgomery's Multiplication Technique: How to Make It Smaller and
                  Faster},
  booktitle    = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  pages        = {80--93},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5\_9},
  doi          = {10.1007/3-540-48059-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Walter98,
  author       = {Colin D. Walter},
  title        = {Exponentiation Using Division Chains},
  journal      = {{IEEE} Trans. Computers},
  volume       = {47},
  number       = {7},
  pages        = {757--765},
  year         = {1998},
  url          = {https://doi.org/10.1109/12.709375},
  doi          = {10.1109/12.709375},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Walter98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Walter97,
  author       = {Colin D. Walter},
  title        = {Space/Time Trade-Offs for Higher Radix Modular Multiplication Using
                  Repeated Addition},
  journal      = {{IEEE} Trans. Computers},
  volume       = {46},
  number       = {2},
  pages        = {139--141},
  year         = {1997},
  url          = {https://doi.org/10.1109/12.565588},
  doi          = {10.1109/12.565588},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Walter97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alp/NedjahWE97,
  author       = {Nadia Nedjah and
                  Colin D. Walter and
                  Stephen E. Eldridge},
  editor       = {Michael Hanus and
                  Jan Heering and
                  Karl Meinke},
  title        = {Optimal Left-to-Right Pattern-Matching Automata},
  booktitle    = {Algebraic and Logic Programming, 6th International Joint Conference,
                  {ALP} '97 - {HOA} '97, Southampton, UK, Spetember 3-5, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1298},
  pages        = {273--286},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027016},
  doi          = {10.1007/BFB0027016},
  timestamp    = {Thu, 14 Oct 2021 10:38:45 +0200},
  biburl       = {https://dblp.org/rec/conf/alp/NedjahWE97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/Walter97,
  author       = {Colin D. Walter},
  title        = {Exponentiation using Division Chains},
  booktitle    = {13th Symposium on Computer Arithmetic {(ARITH-13} '97), 6-9 July 1997,
                  Asilomar, CA, {USA}},
  pages        = {92--97},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ARITH.1997.614883},
  doi          = {10.1109/ARITH.1997.614883},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/Walter97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Walter95,
  author       = {Colin D. Walter},
  title        = {Optimal parameters for on-line arithmetic},
  journal      = {Int. J. Comput. Math.},
  volume       = {56},
  number       = {1-2},
  pages        = {11--18},
  year         = {1995},
  url          = {https://doi.org/10.1080/00207169508804383},
  doi          = {10.1080/00207169508804383},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/Walter95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/Walter95,
  author       = {Colin D. Walter},
  title        = {Verification of hardware combining multiplication, division and square
                  root},
  journal      = {Microprocess. Microsystems},
  volume       = {19},
  number       = {5},
  pages        = {243--245},
  year         = {1995},
  url          = {https://doi.org/10.1016/0141-9331(95)97854-6},
  doi          = {10.1016/0141-9331(95)97854-6},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/Walter95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Walter93,
  author       = {Colin D. Walter},
  title        = {Systolic Modular Multiplication},
  journal      = {{IEEE} Trans. Computers},
  volume       = {42},
  number       = {3},
  pages        = {376--378},
  year         = {1993},
  url          = {https://doi.org/10.1109/12.210181},
  doi          = {10.1109/12.210181},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Walter93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/EldridgeW93,
  author       = {Stephen E. Eldridge and
                  Colin D. Walter},
  title        = {Hardware Implementation of Montgomery's Modular Multiplication Algorithm},
  journal      = {{IEEE} Trans. Computers},
  volume       = {42},
  number       = {6},
  pages        = {693--699},
  year         = {1993},
  url          = {https://doi.org/10.1109/12.277287},
  doi          = {10.1109/12.277287},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/EldridgeW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Walter91,
  author       = {Colin D. Walter},
  title        = {Fast modular multiplication using 2-power radix},
  journal      = {Int. J. Comput. Math.},
  volume       = {39},
  number       = {1-2},
  pages        = {21--28},
  year         = {1991},
  url          = {https://doi.org/10.1080/00207169108803976},
  doi          = {10.1080/00207169108803976},
  timestamp    = {Fri, 10 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/Walter91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Walter91,
  author       = {Colin D. Walter},
  editor       = {Joan Feigenbaum},
  title        = {Faster Modular Multiplication by Operand Scaling},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {313--323},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_26},
  doi          = {10.1007/3-540-46766-1\_26},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Walter91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/WalterB86,
  author       = {Colin D. Walter and
                  Jonathan P. Bowen},
  title        = {Microprocessor interfacing and communication using the Intel {SDK-85:}
                  Borivoje Furht and Himanshu Parikh Prentice-Hall Reston, Englewood
                  Cliffs, NJ, {USA} (April 1986) {\textsterling}31.00 pp 499},
  journal      = {Microprocess. Microsystems},
  volume       = {10},
  number       = {9},
  pages        = {513},
  year         = {1986},
  url          = {https://doi.org/10.1016/0141-9331(86)90197-3},
  doi          = {10.1016/0141-9331(86)90197-3},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/WalterB86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/Walter83,
  author       = {Colin D. Walter},
  title        = {Intersection numbers for coherent configurations and the spectrum
                  of a graph},
  journal      = {J. Comb. Theory, Ser. {B}},
  volume       = {35},
  number       = {2},
  pages        = {201--204},
  year         = {1983},
  url          = {https://doi.org/10.1016/0095-8956(83)90072-2},
  doi          = {10.1016/0095-8956(83)90072-2},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/Walter83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics