CHES A

44 papers

YearTitle / Authors
2003Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers
Burton S. Kaliski Jr., Çetin Kaya Koç, Christof Paar
20022Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis.
Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner
2002A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
Bert den Boer, Kerstin Lemke, Guntram Wicke
2002A Hardware Random Number Generator.
Thomas E. Tkacik
2002A Low-Power Design for an Elliptic Curve Digital Signature Chip.
Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller, Timothy Draelos
2002A New Class of Invertible Mappings.
Alexander Klimov, Adi Shamir
2002A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2
M. Ernst, Michael Jung, Felix Madlener, Sorin A. Huss, Rainer Blümel
2002A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results.
François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
2002Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
2002An End-to-End Systems Approach to Elliptic Curve Cryptography.
Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel F. Finchelstein, Edouard Goupy, Douglas Stebila
2002An Optimized S-Box Circuit Architecture for Low Power AES Design.
Sumio Morioka, Akashi Satoh
2002CHES: Past, Present, and Future.
Jean-Jacques Quisquater
2002DPA Countermeasures by Improving the Window Method.
Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii
2002Dual-Field Arithmetic Unit for GF(p) and GF(2
Johannes Wolkerstorfer
2002Efficient Software Implementation of AES on 32-Bit Platforms.
Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin
2002Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions.
Martijn Stam, Arjen K. Lenstra
2002Enhanced Montgomery Multiplication.
Shay Gueron
2002Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems.
Elisabeth Oswald
2002Error Detection in Polynomial Basis Multipliers over Binary Extension Fields.
Arash Reyhani-Masoleh, M. Anwarul Hasan
2002Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications.
Werner Schindler, Wolfgang Killmann
2002Experience Using a Low-Cost FPGA Design to Crack DES Keys.
Richard Clayton, Mike Bond
2002Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.
Katsuyuki Okeya, Kouichi Sakurai
2002Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures.
Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert
2002Further Results and Considerations on Side Channel Attacks on RSA.
Vlastimil Klíma, Tomás Rosa
2002Genus Two Hyperelliptic Curve Coprocessor.
Nigel Boston, T. Charles Clancy, Y. Liow, Jonathan E. Webster
2002Hardware Implementation of Finite Fields of Characteristic Three.
Dan Page, Nigel P. Smart
2002Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks.
Elena Trichina, Antonio Bellezza
2002Increasing the Bitlength of a Crypto-Coprocessor.
Wieland Fischer, Jean-Pierre Seifert
2002Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study.
Andrew Shane Huang
2002Multiplicative Masking and Power Analysis of AES.
Jovan Dj. Golic, Christophe Tymen
2002New Algorithm for Classical Modular Inverse.
Róbert Lórencz
2002On the Efficient Generation of Elliptic Curves over Prime Fields.
Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis
2002Optical Fault Induction Attacks.
Sergei P. Skorobogatov, Ross J. Anderson
2002Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication.
Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
2002RFID Systems and Security and Privacy Implications.
Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels
2002Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks.
JaeCheol Ha, Sang-Jae Moon
2002Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2).
Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç
2002Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor.
Catherine H. Gebotys, Robert J. Gebotys
2002Simplified Adaptive Multiplicative Masking for AES.
Elena Trichina, Domenico De Seta, Lucia Germani
2002Some Security Aspects of the M IST Randomized Exponentiation Algorithm.
Colin D. Walter
2002Template Attacks.
Suresh Chari, Josyula R. Rao, Pankaj Rohatgi
2002The EM Side-Channel(s).
Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi
2002The Montgomery Powering Ladder.
Marc Joye, Sung-Ming Yen
2002True Random Number Generator Embedded in Reconfigurable Hardware.
Viktor Fischer, Milos Drutarovský