CHES A

28 papers

YearTitle / Authors
2000A 12 Gbps DES Encryptor/Decryptor Core in an FPGA.
Steven Trimberger, Raymond Pang, Amit Singh
2000A 155 Mbps Triple-DES Network Encryptor.
Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer
2000A Comparative Study of Performance of AES Final Candidates Using FPGAs.
Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim
2000A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals.
Takehiko Kato, Satoru Ito, Jun Anzai, Natsume Matsuzaki
2000A Dynamic FPGA Implementation of the Serpent Block Cipher.
Cameron Patterson
2000A High Performance Reconfigurable Elliptic Curve Processor for GF(2
Gerardo Orlando, Christof Paar
2000A Scalable and Unified Multiplier Architecture for Finite Fields GF(
Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç
2000A Timing Attack against RSA with the Chinese Remainder Theorem.
Werner Schindler
2000An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture.
James Goodman, Anantha P. Chandrakasan
2000Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings
Çetin Kaya Koç, Christof Paar
2000Data Integrity in Hardware for Modular Arithmetic.
Colin D. Walter
2000Differential Power Analysis in the Presence of Hardware Countermeasures.
Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous
2000Efficient Generation of Prime Numbers.
Marc Joye, Pascal Paillier, Serge Vaudenay
2000Fast Implementation of Elliptic Curve Defined over GF(
Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee
2000High-Speed RSA Hardware Based on Barret's Modular Reduction Method.
Johann Großschädl
2000How to Explain Side-Channel Leakage to Your Kids.
David Naccache, Michael Tunstall
2000Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2
Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka
2000MiniPASS: Authentication and Digital Signatures in a Constrained Environment.
Jeffrey Hoffstein, Joseph H. Silverman
2000Montgomery Exponentiation with no Final Subtractions: Improved Results.
Gaël Hachez, Jean-Jacques Quisquater
2000Montgomery Multiplier and Squarer in GF(2
Huapeng Wu
2000On Boolean and Arithmetic Masking against Differential Power Analysis.
Jean-Sébastien Coron, Louis Goubin
2000Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences.
Steve H. Weingart
2000Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems.
M. Anwarul Hasan
2000Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies.
Adi Shamir
2000Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards.
Rita Mayer-Sommer
2000Software Implementation of Elliptic Curve Cryptography over Binary Fields.
Darrel Hankerson, Julio César López-Hernández, Alfred Menezes
2000Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis.
Thomas Pornin, Jacques Stern
2000Using Second-Order Power Analysis to Attack DPA Resistant Software.
Thomas S. Messerges