CHES A

30 papers

YearTitle / Authors
1999A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond.
D. Craig Wilcox, Lyndon G. Pierson, Perry J. Robertson, Edward L. Witzke, Karl Gass
1999A Design of Reliable True Random Number Generator for Cryptographic Applications.
Vittorio Bagini, Marco Bucci
1999A High-Performance Flexible Architecture for Cryptography.
R. Reed Taylor, Seth Copen Goldstein
1999A Scalable Architecture for Montgomery Multiplication.
Alexandre F. Tenca, Çetin Kaya Koç
1999Arithmetic Design for Permutation Groups.
Tamás Horváth
1999CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor.
Emeka Mosanya, Christof Teuscher, Héctor Fabio Restrepo, Patrick Galley, Eduardo Sanchez
1999Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings
Çetin Kaya Koç, Christof Paar
1999DES Cracking on the Transmogrifier 2a.
Ivan Hamer, Paul Chow
1999DES and Differential Power Analysis (The "Duplication" Method).
Louis Goubin, Jacques Patarin
1999Efficient Finite Field Basis Conversion Involving Dual Bases.
Burton S. Kaliski Jr., Moses D. Liskov
1999Elliptic Curve Scalar Multiplier Design Using FPGAs.
Lijun Gao, Sarvesh Shrivastava, Gerald E. Sobelman
1999Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
Oliver Jung, Christoph Ruland
1999Factoring Large Numbers with the Twinkle Device (Extended Abstract).
Adi Shamir
1999Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201.
Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara
1999Fast Multiplication in Finite Fields GF(2
Joseph H. Silverman
1999Fast Multiplication on Elliptic Curves over GF(2
Julio López, Ricardo Dahab
1999Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton.
Eunjong Hong, Jai-Hoon Chung, Chae Hoon Lim
1999Highly Regular Architectures for Finite Field Computation Using Redundant Basis.
Huapeng Wu, M. Anwarul Hasan, Ian F. Blake
1999How to Implement Cost-Effective and Secure Public Key Cryptosystems.
Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim
1999IPA: A New Class of Power Attacks.
Paul N. Fahn, Peter K. Pearson
1999Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis.
Huapeng Wu
1999Modelling the Crypto-Processor from Design to Synthesis.
W. P. Choi, Lee-Ming Cheng
1999Montgomery's Multiplication Technique: How to Make It Smaller and Faster.
Colin D. Walter
1999NICE - New Ideal Coset Encryption.
Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi
1999Power Analysis Attacks of Modular Exponentiation in Smartcards.
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan
1999Probing Attacks on Tamper-Resistant Devices.
Helena Handschuh, Pascal Paillier, Jacques Stern
1999Random Number Generators Founded on Signal and Information Theory.
David Paul Maher, Robert J. Rance
1999Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems.
Jean-Sébastien Coron
1999Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems.
Eberhard von Faber
1999We Need Assurance.
Brian D. Snow