Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Colin D. Walter
@article{DBLP:journals/iacr/Walter17, author = {Colin D. Walter}, title = {The Montgomery and Joye Powering Ladders are Dual}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1081}, year = {2017}, url = {http://eprint.iacr.org/2017/1081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Walter17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Walter17a, author = {Colin D. Walter}, title = {Hardware Aspects of Montgomery Modular Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1115}, year = {2017}, url = {http://eprint.iacr.org/2017/1115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Walter17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/MsgnaW14, author = {Mehari G. Msgna and Colin D. Walter}, editor = {Konstantinos Markantonakis and Keith Mayes}, title = {An Overview of {PIC} Microcontrollers and Their Suitability for Cryptographic Algorithms}, booktitle = {Secure Smart Embedded Devices, Platforms and Applications}, pages = {475--495}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7915-4\_21}, doi = {10.1007/978-1-4614-7915-4\_21}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/14/MsgnaW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SaeedBW13, author = {Muhammad Qasim Saeed and Zeeshan Bilal and Colin D. Walter}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {An {NFC} based consumer-level counterfeit detection framework}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {135--142}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596047}, doi = {10.1109/PST.2013.6596047}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SaeedBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Walter12, author = {Colin D. Walter}, editor = {Orr Dunkelman}, title = {A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {84--97}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_6}, doi = {10.1007/978-3-642-27954-6\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Walter12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaeedW12, author = {Muhammad Qasim Saeed and Colin D. Walter}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Off-line {NFC} Tag Authentication}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {730--735}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470914/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/SaeedW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaeedW11, author = {Muhammad Qasim Saeed and Colin D. Walter}, title = {A Record Composition/Decomposition attack on the {NDEF} Signature Record Type Definition}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {283--287}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148458/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaeedW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/ContiniKW11, author = {Scott Contini and {\c{C}}etin Kaya Ko{\c{c}} and Colin D. Walter}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Modular Arithmetic}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {795--798}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_49}, doi = {10.1007/978-1-4419-5906-5\_49}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/ContiniKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Walter10, author = {Colin D. Walter}, editor = {Yongwha Chung and Moti Yung}, title = {Fast Scalar Multiplication for {ECC} over GF(\emph{p}) Using Division Chains}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {61--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_5}, doi = {10.1007/978-3-642-17955-6\_5}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Walter10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchindlerW09, author = {Werner Schindler and Colin D. Walter}, editor = {Matthew Geoffrey Parker}, title = {Optimal Recovery of Secret Keys from Weak Side Channel Traces}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {446--468}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_27}, doi = {10.1007/978-3-642-10868-6\_27}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/SchindlerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Walter09, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Leakage from Montgomery Multiplication}, booktitle = {Cryptographic Engineering}, pages = {431--449}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_16}, doi = {10.1007/978-0-387-71817-0\_16}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Walter09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Walter09a, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Randomized Exponentiation Algorithms}, booktitle = {Cryptographic Engineering}, pages = {451--473}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_17}, doi = {10.1007/978-0-387-71817-0\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Walter09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter08, author = {Colin D. Walter}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {214--227}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_14}, doi = {10.1007/978-3-540-85053-3\_14}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Walter07, author = {Colin D. Walter}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Longer Randomly Blinded {RSA} Keys May Be Weaker Than Shorter Ones}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {303--316}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_22}, doi = {10.1007/978-3-540-77535-5\_22}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Walter07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/WalterS05, author = {Colin D. Walter and David Samyde}, title = {Data Dependent Power Use in Multipliers}, booktitle = {17th {IEEE} Symposium on Computer Arithmetic {(ARITH-17} 2005), 27-29 June 2005, Cape Cod, MA, {USA}}, pages = {4--12}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ARITH.2005.14}, doi = {10.1109/ARITH.2005.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/WalterS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/ContiniKW05, author = {Scott Contini and {\c{C}}etin Kaya Ko{\c{c}} and Colin D. Walter}, editor = {Henk C. A. van Tilborg}, title = {Modular Arithmetic}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_259}, doi = {10.1007/0-387-23483-7\_259}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/ContiniKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KocW05, author = {{\c{C}}etin Kaya Ko{\c{c}} and Colin D. Walter}, editor = {Henk C. A. van Tilborg}, title = {Montgomery Arithmetic}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_263}, doi = {10.1007/0-387-23483-7\_263}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KocW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter04, author = {Colin D. Walter}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Simple Power Analysis of Unified Code for {ECC} Double and Add}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {191--204}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_14}, doi = {10.1007/978-3-540-28632-5\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Walter04, author = {Colin D. Walter}, editor = {Tatsuaki Okamoto}, title = {Issues of Security with the Oswald-Aigner Exponentiation Algorithm}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {208--221}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_17}, doi = {10.1007/978-3-540-24660-2\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Walter04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/ArnoldBCW03, author = {Mark G. Arnold and Thomas A. Bailey and John R. Cowles and Colin D. Walter}, title = {Fast Fourier Transforms Using the Complex Logarithmic Number System}, journal = {J. {VLSI} Signal Process.}, volume = {33}, number = {3}, pages = {325--335}, year = {2003}, url = {https://doi.org/10.1023/A:1022236132192}, doi = {10.1023/A:1022236132192}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/ArnoldBCW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Walter03, author = {Colin D. Walter}, editor = {Marc Joye}, title = {Seeing through {MIST} Given a Small Fraction of an {RSA} Private Key}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {391--402}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_27}, doi = {10.1007/3-540-36563-X\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Walter03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchindlerW03, author = {Werner Schindler and Colin D. Walter}, editor = {Kenneth G. Paterson}, title = {More Detail for a Combined Timing and Power Attack against Implementations of {RSA}}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {245--263}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_20}, doi = {10.1007/978-3-540-40974-8\_20}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchindlerW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Walter03, author = {Colin D. Walter}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Longer Keys May Facilitate Side Channel Attacks}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {42--57}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_4}, doi = {10.1007/978-3-540-24654-1\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Walter03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2003, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6}, doi = {10.1007/978-3-540-45238-6}, isbn = {3-540-40833-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Walter03, author = {Colin D. Walter}, title = {Security Constraints on the Oswald-Aigner Exponentiation Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2003}, url = {http://eprint.iacr.org/2003/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Walter03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Walter02, author = {Colin D. Walter}, editor = {Peter Honeyman}, title = {Breaking the Liardet-Smart Randomized Exponentiation Algorithm}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, pages = {59--68}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/cardis02/walter.html}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Walter02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter02, author = {Colin D. Walter}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Some Security Aspects of the {M} {IST} Randomized Exponentiation Algorithm}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {276--290}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_21}, doi = {10.1007/3-540-36400-5\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Walter02, author = {Colin D. Walter}, editor = {Bart Preneel}, title = {Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure {RSA} Moduli}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {30--39}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_3}, doi = {10.1007/3-540-45760-7\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Walter02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Walter02a, author = {Colin D. Walter}, editor = {Bart Preneel}, title = {{MIST:} An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {53--66}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_5}, doi = {10.1007/3-540-45760-7\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Walter02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/ArnoldW01, author = {Mark G. Arnold and Colin D. Walter}, title = {Unrestricted Faithful Rounding is Good Enough for Some {LNS} Applications}, booktitle = {15th {IEEE} Symposium on Computer Arithmetic (Arith-15 2001), 11-17 June 2001, Vail, CO, {USA}}, pages = {237--246}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ARITH.2001.930125}, doi = {10.1109/ARITH.2001.930125}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/ArnoldW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter01, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Sliding Windows Succumbs to Big Mac Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {286--299}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_24}, doi = {10.1007/3-540-44709-1\_24}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Walter01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WalterT01, author = {Colin D. Walter and Susan Thompson}, editor = {David Naccache}, title = {Distinguishing Exponent Digits by Observing Modular Subtractions}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {192--207}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_15}, doi = {10.1007/3-540-45353-9\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WalterT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter00, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Data Integrity in Hardware for Modular Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {204--215}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_15}, doi = {10.1007/3-540-44499-8\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/NedjahWE99, author = {Nadia Nedjah and Colin D. Walter and Stephen E. Eldridge}, title = {Efficient Automata-Driven Pattern-Matching for Equational Programs}, journal = {Softw. Pract. Exp.}, volume = {29}, number = {9}, pages = {793--813}, year = {1999}, url = {https://doi.org/10.1002/(SICI)1097-024X(19990725)29:9\&\#60;793::AID-SPE254\&\#62;3.0.CO;2-M}, doi = {10.1002/(SICI)1097-024X(19990725)29:9\&\#60;793::AID-SPE254\&\#62;3.0.CO;2-M}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/NedjahWE99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/Walter99, author = {Colin D. Walter}, title = {Moduli for Testing Implementations of the {RSA} Cryptosystem}, booktitle = {14th {IEEE} Symposium on Computer Arithmetic (Arith-14 '99), 14-16 April 1999, Adelaide, Australia}, pages = {78--85}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ARITH.1999.762832}, doi = {10.1109/ARITH.1999.762832}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/Walter99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter99, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Montgomery's Multiplication Technique: How to Make It Smaller and Faster}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, pages = {80--93}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5\_9}, doi = {10.1007/3-540-48059-5\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Walter98, author = {Colin D. Walter}, title = {Exponentiation Using Division Chains}, journal = {{IEEE} Trans. Computers}, volume = {47}, number = {7}, pages = {757--765}, year = {1998}, url = {https://doi.org/10.1109/12.709375}, doi = {10.1109/12.709375}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Walter98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Walter97, author = {Colin D. Walter}, title = {Space/Time Trade-Offs for Higher Radix Modular Multiplication Using Repeated Addition}, journal = {{IEEE} Trans. Computers}, volume = {46}, number = {2}, pages = {139--141}, year = {1997}, url = {https://doi.org/10.1109/12.565588}, doi = {10.1109/12.565588}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Walter97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alp/NedjahWE97, author = {Nadia Nedjah and Colin D. Walter and Stephen E. Eldridge}, editor = {Michael Hanus and Jan Heering and Karl Meinke}, title = {Optimal Left-to-Right Pattern-Matching Automata}, booktitle = {Algebraic and Logic Programming, 6th International Joint Conference, {ALP} '97 - {HOA} '97, Southampton, UK, Spetember 3-5, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1298}, pages = {273--286}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027016}, doi = {10.1007/BFB0027016}, timestamp = {Thu, 14 Oct 2021 10:38:45 +0200}, biburl = {https://dblp.org/rec/conf/alp/NedjahWE97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/Walter97, author = {Colin D. Walter}, title = {Exponentiation using Division Chains}, booktitle = {13th Symposium on Computer Arithmetic {(ARITH-13} '97), 6-9 July 1997, Asilomar, CA, {USA}}, pages = {92--97}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ARITH.1997.614883}, doi = {10.1109/ARITH.1997.614883}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/Walter97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/Walter95, author = {Colin D. Walter}, title = {Optimal parameters for on-line arithmetic}, journal = {Int. J. Comput. Math.}, volume = {56}, number = {1-2}, pages = {11--18}, year = {1995}, url = {https://doi.org/10.1080/00207169508804383}, doi = {10.1080/00207169508804383}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/Walter95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/Walter95, author = {Colin D. Walter}, title = {Verification of hardware combining multiplication, division and square root}, journal = {Microprocess. Microsystems}, volume = {19}, number = {5}, pages = {243--245}, year = {1995}, url = {https://doi.org/10.1016/0141-9331(95)97854-6}, doi = {10.1016/0141-9331(95)97854-6}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/Walter95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Walter93, author = {Colin D. Walter}, title = {Systolic Modular Multiplication}, journal = {{IEEE} Trans. Computers}, volume = {42}, number = {3}, pages = {376--378}, year = {1993}, url = {https://doi.org/10.1109/12.210181}, doi = {10.1109/12.210181}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Walter93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/EldridgeW93, author = {Stephen E. Eldridge and Colin D. Walter}, title = {Hardware Implementation of Montgomery's Modular Multiplication Algorithm}, journal = {{IEEE} Trans. Computers}, volume = {42}, number = {6}, pages = {693--699}, year = {1993}, url = {https://doi.org/10.1109/12.277287}, doi = {10.1109/12.277287}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/EldridgeW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/Walter91, author = {Colin D. Walter}, title = {Fast modular multiplication using 2-power radix}, journal = {Int. J. Comput. Math.}, volume = {39}, number = {1-2}, pages = {21--28}, year = {1991}, url = {https://doi.org/10.1080/00207169108803976}, doi = {10.1080/00207169108803976}, timestamp = {Fri, 10 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/Walter91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Walter91, author = {Colin D. Walter}, editor = {Joan Feigenbaum}, title = {Faster Modular Multiplication by Operand Scaling}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {313--323}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_26}, doi = {10.1007/3-540-46766-1\_26}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Walter91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/WalterB86, author = {Colin D. Walter and Jonathan P. Bowen}, title = {Microprocessor interfacing and communication using the Intel {SDK-85:} Borivoje Furht and Himanshu Parikh Prentice-Hall Reston, Englewood Cliffs, NJ, {USA} (April 1986) {\textsterling}31.00 pp 499}, journal = {Microprocess. Microsystems}, volume = {10}, number = {9}, pages = {513}, year = {1986}, url = {https://doi.org/10.1016/0141-9331(86)90197-3}, doi = {10.1016/0141-9331(86)90197-3}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/WalterB86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/Walter83, author = {Colin D. Walter}, title = {Intersection numbers for coherent configurations and the spectrum of a graph}, journal = {J. Comb. Theory, Ser. {B}}, volume = {35}, number = {2}, pages = {201--204}, year = {1983}, url = {https://doi.org/10.1016/0095-8956(83)90072-2}, doi = {10.1016/0095-8956(83)90072-2}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/Walter83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.