The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CHES"( http://dblp.L3S.de/Venues/CHES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ches

Publication years (Num. hits)
1999 (30) 2000 (28) 2001 (34) 2002 (43) 2003 (35) 2004 (33) 2005 (33) 2006 (36) 2007 (32) 2008 (30) 2009 (33) 2010 (31) 2011 (34) 2012 (33) 2013 (28) 2014 (34) 2015 (35) 2016 (31) 2017 (34)
Publication types (Num. hits)
inproceedings(608) proceedings(19)
Venues (Conferences, Journals, ...)
CHES(627)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 666 occurrences of 255 keywords

Results
Found 627 publication records. Showing 627 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
1Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller 0001, Timothy Draelos A Low-Power Design for an Elliptic Curve Digital Signature Chip. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimal El Gamal, Characteristic 2, Field Towers, Trinomial Basis, Qsolve, Almost-Inverse Algorithm, Point Halving, Signed Sliding Window, GF(289), GF(2178), Low Power, Digital Signature, VHDL, Hardware, Elliptic Curve, ECDSA, Quadratic Equation
1Arash Reyhani-Masoleh, M. Anwarul Hasan Error Detection in Polynomial Basis Multipliers over Binary Extension Fields. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF polynomial basis multiplier, fault tolerant computing, Finite fields, error detection
1Suresh Chari, Josyula R. Rao, Pankaj Rohatgi Template Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis On the Efficient Generation of Elliptic Curves over Prime Fields. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Werner Schindler, Wolfgang Killmann Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF entropy, online test, evaluation criteria, True random number generator
1Sumio Morioka, Akashi Satoh An Optimized S-Box Circuit Architecture for Low Power AES Design. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
1Dan Page, Nigel P. Smart Hardware Implementation of Finite Fields of Characteristic Three. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1M. Ernst, Michael Jung 0002, Felix Madlener, Sorin A. Huss, Rainer Blümel A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF $ mathbb {GF}(2^n)$ arithmetic, Karatsuba multiplication, VHDL model generator, coprocessor synthesis, FPGA hardware acceleration, Atmel FPSLIC platform, Elliptic Curve cryptography
1Jovan Dj. Golic, Christophe Tymen Multiplicative Masking and Power Analysis of AES. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multiplicative masking, AES, differential power analysis, countermeasures
1Johannes Wolkerstorfer Dual-Field Arithmetic Unit for GF(p) and GF(2m). Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multiplication, hardware implementation, inversion, Finite field arithmetic, redundant number representation, modular reduction
1Sergei P. Skorobogatov, Ross J. Anderson Optical Fault Induction Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii DPA Countermeasures by Improving the Window Method. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Richard Clayton 0001, Mike Bond Experience Using a Low-Cost FPGA Design to Crack DES Keys. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel F. Finchelstein, Edouard Goupy, Douglas Stebila An End-to-End Systems Approach to Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Thomas E. Tkacik A Hardware Random Number Generator. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Elisabeth Oswald Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Kouichi Sakurai Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multi-scalar multiplication, Montgomery trick, elliptic curve cryptography, precomputation, simultaneous
1Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi The EM Side-Channel(s). Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin 0002 Efficient Software Implementation of AES on 32-Bit Platforms. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Andrew Shane Huang Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Martijn Stam, Arjen K. Lenstra Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF LUC, finite field, XTR, cyclotomic polynomial
1Viktor Fischer, Milos Drutarovský True Random Number Generator Embedded in Reconfigurable Hardware. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Elena Trichina, Domenico De Seta, Lucia Germani Simplified Adaptive Multiplicative Masking for AES. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Shay Gueron Enhanced Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Marc Joye, Sung-Ming Yen The Montgomery Powering Ladder. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Montgomery powering ladder, constrained environments, cryptographic implementations, side-channel attacks, fault attacks, Exponentiation algorithms
1Nigel Boston, T. Charles Clancy, Y. Liow, Jonathan E. Webster Genus Two Hyperelliptic Curve Coprocessor. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1JaeCheol Ha, Sang-Jae Moon Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form
1Colin D. Walter Some Security Aspects of the M IST Randomized Exponentiation Algorithm. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA
1Wieland Fischer, Jean-Pierre Seifert Increasing the Bitlength of a Crypto-Coprocessor. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Arithmetical coprocessor, Hardware/Software codesign, Modular multiplication, Hardware architecture
1Adi Shamir New Directions in Croptography. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Daniel V. Bailey, Daniel Coffin, Adam J. Elbirt, Joseph H. Silverman, Adam D. Woodbury NTRU in Constrained Devices. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  BibTeX  RDF
1Marc Joye, Jean-Jacques Quisquater Hessian Elliptic Curves and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, Implementation, Smart-cards, Side-channel attacks, Elliptic curves
1Louis Goubin A Sound Method for Switching between Boolean and Arithmetic Masking. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption
1Marc Joye, Christophe Tymen Protections against Differential Analysis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks
1Manuel Leone A New Low Complexity Parallel Multiplier for a Class of Finite Fields. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Pierre-Yvan Liardet, Nigel P. Smart Preventing SPA/DPA in ECC Systems Using the Jacobi Form. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Karine Gandolfi, Christophe Mourtel, Francis Olivier Electromagnetic Analysis: Concrete Results. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart cards, DPA, SPA, DEMA, side channel leakage, SEMA, electromagnetic analysis
1Henry Kuo, Ingrid Verbauwhede Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson Protecting Embedded Systems - The Next Ten Years. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  BibTeX  RDF
1Thomas Pornin Transparent Harddisk Encryption. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF bitslice, harddisk, mobile computing, encryption
1Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç Generating Elliptic Curves of Prime Order. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation
1Çetin Kaya Koç, David Naccache, Christof Paar (eds.) Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001, Subhamoy Maitra Efficient Implementation of "Large" Stream Cipher Systems. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Boolean functions, Stream Ciphers, Cellular Automata, Linear Feedback Shift Registers, Reconfigurable Hardware, Pipelined Architecture
1Mike Bond Attacks on Cryptoprocessor Transaction Sets. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Viktor Fischer, Milos Drutarovský Two Methods of Rijndael Implementation in Reconfigurable Hardware. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Johann Großschädl A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF iterative modulo multiplication, polynomial basis representation, bit-serial multiplier architecture, smart card crypto-coprocessor, Elliptic curve cryptography, finite field arithmetic
1Máire McLoone, John V. McCanny High Performance Single-Chip FPGA Rijndael Algorithm Implementations. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Encryption, AES, Rijndael, FPGA Implementation
1Elisabeth Oswald, Manfred Josef Aigner Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystems, Power Analysis
1Ocean Y. H. Cheung, Kuen Hung Tsoi, Philip Heng Wai Leong, Monk-Ping Leong Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF performance-tradeoffs, reconfigurable-computing, digital-design, Cryptographic hardware
1Christophe Clavier, Marc Joye Universal Exponentiation Algorithm. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Implementation, smart-cards, provable security, side-channel attacks, discrete logarithm, exponentiation, simple power analysis (SPA), RSA cryptosystem, addition chains
1David May 0001, Henk L. Muller, Nigel P. Smart Random Register Renaming to Foil DPA. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Gerardo Orlando, Christof Paar A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Werner Schindler Efficient Online Tests for True Random Number Generators. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF statistical test, online test, True random number generator
1Nigel P. Smart The Hessian Form of an Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Kouichi Sakurai Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  BibTeX  RDF
1Eric Brier, Helena Handschuh, Christophe Tymen Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance
1Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Colin D. Walter Sliding Windows Succumbs to Big Mac Attack. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation
1Adam L. Young, Moti Yung Bandwidth-Optimal Kleptographic Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory
1Alexandre F. Tenca, Georgi Todorov, Çetin Kaya Koç High-Radix Design of a Scalable Modular Multiplier. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF modular multiplier, montgomery multiplier, high-radix, scalable architecture
1Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Mehdi-Laurent Akkar, Christophe Giraud 0001 An Implementation of DES and AES, Secure against Some Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Werner Schindler A Timing Attack against RSA with the Chinese Remainder Theorem. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA, Chinese Remainder Theorem, Montgomery multiplication, Timing attack
1Jeffrey Hoffstein, Joseph H. Silverman MiniPASS: Authentication and Digital Signatures in a Constrained Environment. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Cameron Patterson A Dynamic FPGA Implementation of the Serpent Block Cipher. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Colin D. Walter Data Integrity in Hardware for Modular Arithmetic. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF checker circuit, fault tolerance, testing, cryptography, data integrity, RSA, Computer arithmetic, correctness, error correction, soft errors, Montgomery multiplication, modular multiplication, modular exponentiation
1Rita Mayer-Sommer Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Thomas S. Messerges Using Second-Order Power Analysis to Attack DPA Resistant Software. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve
1Takehiko Kato, Satoru Ito, Jun Anzai, Natsume Matsuzaki A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Marc Joye, Pascal Paillier, Serge Vaudenay Efficient Generation of Prime Numbers. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Prime number generation, crypto-processors, smart-cards, RSA, DSA, key generation, fast implementations
1Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1James Goodman 0001, Anantha P. Chandrakasan An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Gaël Hachez, Jean-Jacques Quisquater Montgomery Exponentiation with no Final Subtractions: Improved Results. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF smart cards, Montgomery multiplication, timing attacks, modular exponentiation, power attacks
1Gerardo Orlando, Christof Paar A High Performance Reconfigurable Elliptic Curve Processor for GF(2m). Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer A 155 Mbps Triple-DES Network Encryptor. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DES algorithm, cipher block chaining, true single-phase logic, full-custom design, Network security, pipelining, encryption, Triple-DES
1Thomas Pornin, Jacques Stern Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF A5/1, FPGA, cryptanalysis, stream cipher, GSM, trade-off
1Çetin Kaya Koç, Christof Paar (eds.) Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim A Comparative Study of Performance of AES Final Candidates Using FPGAs. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Adi Shamir Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Smart cards, DPA, power analysis, SPA
1Jean-Sébastien Coron, Louis Goubin On Boolean and Arithmetic Masking against Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption
1David Naccache, Michael Tunstall How to Explain Side-Channel Leakage to Your Kids. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Johann Großschädl High-Speed RSA Hardware Based on Barret's Modular Reduction Method. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic
1Huapeng Wu Montgomery Multiplier and Squarer in GF(2m). Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1M. Anwarul Hasan Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Steven Trimberger, Raymond Pang, Amit Singh A 12 Gbps DES Encryptor/Decryptor Core in an FPGA. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous Differential Power Analysis in the Presence of Hardware Countermeasures. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hardware countermeasure, random process interrupt, smart card, Power analysis
1Darrel Hankerson, Julio César López-Hernández, Alfred Menezes Software Implementation of Elliptic Curve Cryptography over Binary Fields. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Prime fields, binary extension fields, scalability, multiplication, hardware implementation, Montgomery multiplication
1Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Burton S. Kaliski Jr., Moses D. Liskov Efficient Finite Field Basis Conversion Involving Dual Bases. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1R. Reed Taylor, Seth Copen Goldstein A High-Performance Flexible Architecture for Cryptography. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Paul N. Fahn, Peter K. Pearson IPA: A New Class of Power Attacks. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 627 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license