# Colin D. Walter

According to our database

Collaborative distances:

^{1}, Colin D. Walter authored at least 46 papers between 1983 and 2017.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2017

IACR Cryptol. ePrint Arch., 2017

IACR Cryptol. ePrint Arch., 2017

2014

An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms.

Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013

Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012

Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition.

Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010

Proceedings of the Information Security Applications - 11th International Workshop, 2010

2009

Proceedings of the Cryptography and Coding, 2009

Proceedings of the Cryptographic Engineering, 2009

Proceedings of the Cryptographic Engineering, 2009

2008

Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007

Proceedings of the Information Security Applications, 8th International Workshop, 2007

2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the 17th IEEE Symposium on Computer Arithmetic (ARITH-17 2005), 2005

2004

Proceedings of the Topics in Cryptology, 2004

Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003

J. VLSI Signal Process., 2003

IACR Cryptol. ePrint Arch., 2003

Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

More Detail for a Combined Timing and Power Attack against Implementations of RSA.

Proceedings of the Cryptography and Coding, 2003

Proceedings of the Topics in Cryptology, 2003

2002

MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis.

Proceedings of the Topics in Cryptology, 2002

Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli.

Proceedings of the Topics in Cryptology, 2002

Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2001

Proceedings of the Topics in Cryptology, 2001

Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

Proceedings of the 15th IEEE Symposium on Computer Arithmetic (Arith-15 2001), 2001

2000

Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

1999

Softw. Pract. Exp., 1999

Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

Proceedings of the 14th IEEE Symposium on Computer Arithmetic (Arith-14 '99), 1999

1998

IEEE Trans. Computers, 1998

1997

Space/Time Trade-Offs for Higher Radix Modular Multiplication Using Repeated Addition.

IEEE Trans. Computers, 1997

Proceedings of the Algebraic and Logic Programming, 6th International Joint Conference, 1997

1995

Microprocess. Microsystems, 1995

Int. J. Comput. Math., 1995

1993

IEEE Trans. Computers, 1993

IEEE Trans. Computers, 1993

1991

Int. J. Comput. Math., 1991

Proceedings of the Advances in Cryptology, 1991

1986

Microprocessor interfacing and communication using the Intel SDK-85: Borivoje Furht and Himanshu Parikh Prentice-Hall Reston, Englewood Cliffs, NJ, USA (April 1986) £31.00 pp 499.

Microprocess. Microsystems, 1986

1983

J. Comb. Theory, Ser. B, 1983