| 2000 | A 12 Gbps DES Encryptor/Decryptor Core in an FPGA. Steven Trimberger, Raymond Pang, Amit Singh |
| 2000 | A 155 Mbps Triple-DES Network Encryptor. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer |
| 2000 | A Comparative Study of Performance of AES Final Candidates Using FPGAs. Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim |
| 2000 | A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals. Takehiko Kato, Satoru Ito, Jun Anzai, Natsume Matsuzaki |
| 2000 | A Dynamic FPGA Implementation of the Serpent Block Cipher. Cameron Patterson |
| 2000 | A High Performance Reconfigurable Elliptic Curve Processor for GF(2 Gerardo Orlando, Christof Paar |
| 2000 | A Scalable and Unified Multiplier Architecture for Finite Fields GF( Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç |
| 2000 | A Timing Attack against RSA with the Chinese Remainder Theorem. Werner Schindler |
| 2000 | An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture. James Goodman, Anantha P. Chandrakasan |
| 2000 | Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings Çetin Kaya Koç, Christof Paar |
| 2000 | Data Integrity in Hardware for Modular Arithmetic. Colin D. Walter |
| 2000 | Differential Power Analysis in the Presence of Hardware Countermeasures. Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous |
| 2000 | Efficient Generation of Prime Numbers. Marc Joye, Pascal Paillier, Serge Vaudenay |
| 2000 | Fast Implementation of Elliptic Curve Defined over GF( Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee |
| 2000 | High-Speed RSA Hardware Based on Barret's Modular Reduction Method. Johann Großschädl |
| 2000 | How to Explain Side-Channel Leakage to Your Kids. David Naccache, Michael Tunstall |
| 2000 | Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2 Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka |
| 2000 | MiniPASS: Authentication and Digital Signatures in a Constrained Environment. Jeffrey Hoffstein, Joseph H. Silverman |
| 2000 | Montgomery Exponentiation with no Final Subtractions: Improved Results. Gaël Hachez, Jean-Jacques Quisquater |
| 2000 | Montgomery Multiplier and Squarer in GF(2 Huapeng Wu |
| 2000 | On Boolean and Arithmetic Masking against Differential Power Analysis. Jean-Sébastien Coron, Louis Goubin |
| 2000 | Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences. Steve H. Weingart |
| 2000 | Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems. M. Anwarul Hasan |
| 2000 | Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. Adi Shamir |
| 2000 | Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. Rita Mayer-Sommer |
| 2000 | Software Implementation of Elliptic Curve Cryptography over Binary Fields. Darrel Hankerson, Julio César López-Hernández, Alfred Menezes |
| 2000 | Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. Thomas Pornin, Jacques Stern |
| 2000 | Using Second-Order Power Analysis to Attack DPA Resistant Software. Thomas S. Messerges |