| 2003 | Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers Burton S. Kaliski Jr., Çetin Kaya Koç, Christof Paar |
| 2002 | 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis. Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner |
| 2002 | A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Bert den Boer, Kerstin Lemke, Guntram Wicke |
| 2002 | A Hardware Random Number Generator. Thomas E. Tkacik |
| 2002 | A Low-Power Design for an Elliptic Curve Digital Signature Chip. Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller, Timothy Draelos |
| 2002 | A New Class of Invertible Mappings. Alexander Klimov, Adi Shamir |
| 2002 | A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 M. Ernst, Michael Jung, Felix Madlener, Sorin A. Huss, Rainer Blümel |
| 2002 | A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
| 2002 | Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
| 2002 | An End-to-End Systems Approach to Elliptic Curve Cryptography. Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel F. Finchelstein, Edouard Goupy, Douglas Stebila |
| 2002 | An Optimized S-Box Circuit Architecture for Low Power AES Design. Sumio Morioka, Akashi Satoh |
| 2002 | CHES: Past, Present, and Future. Jean-Jacques Quisquater |
| 2002 | DPA Countermeasures by Improving the Window Method. Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii |
| 2002 | Dual-Field Arithmetic Unit for GF(p) and GF(2 Johannes Wolkerstorfer |
| 2002 | Efficient Software Implementation of AES on 32-Bit Platforms. Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin |
| 2002 | Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. Martijn Stam, Arjen K. Lenstra |
| 2002 | Enhanced Montgomery Multiplication. Shay Gueron |
| 2002 | Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. Elisabeth Oswald |
| 2002 | Error Detection in Polynomial Basis Multipliers over Binary Extension Fields. Arash Reyhani-Masoleh, M. Anwarul Hasan |
| 2002 | Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications. Werner Schindler, Wolfgang Killmann |
| 2002 | Experience Using a Low-Cost FPGA Design to Crack DES Keys. Richard Clayton, Mike Bond |
| 2002 | Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. Katsuyuki Okeya, Kouichi Sakurai |
| 2002 | Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
| 2002 | Further Results and Considerations on Side Channel Attacks on RSA. Vlastimil Klíma, Tomás Rosa |
| 2002 | Genus Two Hyperelliptic Curve Coprocessor. Nigel Boston, T. Charles Clancy, Y. Liow, Jonathan E. Webster |
| 2002 | Hardware Implementation of Finite Fields of Characteristic Three. Dan Page, Nigel P. Smart |
| 2002 | Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. Elena Trichina, Antonio Bellezza |
| 2002 | Increasing the Bitlength of a Crypto-Coprocessor. Wieland Fischer, Jean-Pierre Seifert |
| 2002 | Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study. Andrew Shane Huang |
| 2002 | Multiplicative Masking and Power Analysis of AES. Jovan Dj. Golic, Christophe Tymen |
| 2002 | New Algorithm for Classical Modular Inverse. Róbert Lórencz |
| 2002 | On the Efficient Generation of Elliptic Curves over Prime Fields. Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis |
| 2002 | Optical Fault Induction Attacks. Sergei P. Skorobogatov, Ross J. Anderson |
| 2002 | Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica |
| 2002 | RFID Systems and Security and Privacy Implications. Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels |
| 2002 | Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. JaeCheol Ha, Sang-Jae Moon |
| 2002 | Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç |
| 2002 | Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor. Catherine H. Gebotys, Robert J. Gebotys |
| 2002 | Simplified Adaptive Multiplicative Masking for AES. Elena Trichina, Domenico De Seta, Lucia Germani |
| 2002 | Some Security Aspects of the M IST Randomized Exponentiation Algorithm. Colin D. Walter |
| 2002 | Template Attacks. Suresh Chari, Josyula R. Rao, Pankaj Rohatgi |
| 2002 | The EM Side-Channel(s). Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi |
| 2002 | The Montgomery Powering Ladder. Marc Joye, Sung-Ming Yen |
| 2002 | True Random Number Generator Embedded in Reconfigurable Hardware. Viktor Fischer, Milos Drutarovský |