| 2004 | A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
| 2004 | A Differential Fault Attack Against Early Rounds of (Triple-)DES. Ludger Hemme |
| 2004 | A Low-Cost ECC Coprocessor for Smartcards. Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer |
| 2004 | A New Attack with Side Channel Leakage During Exponent Recoding Computations. Yasuyuki Sakai, Kouichi Sakurai |
| 2004 | An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications. Holger Bock, Marco Bucci, Raimondo Luzzi |
| 2004 | Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. Roberto Maria Avanzi |
| 2004 | Attacking DSA Under a Repeated Bits Assumption. Peter James Leadbitter, Dan Page, Nigel P. Smart |
| 2004 | Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz |
| 2004 | Concurrent Error Detection Schemes for Involution Ciphers. Nikhil Joshi, Kaijie Wu, Ramesh Karri |
| 2004 | Correlation Power Analysis with a Leakage Model. Eric Brier, Christophe Clavier, Francis Olivier |
| 2004 | Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings Marc Joye, Jean-Jacques Quisquater |
| 2004 | DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. Kerstin Lemke, Kai Schramm, Christof Paar |
| 2004 | Defeating Countermeasures Based on Randomized BSD Representations. Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette |
| 2004 | Efficient Countermeasures against RPA, DPA, and SPA. Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
| 2004 | Efficient Linear Array for Multiplication in GF(2 Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong |
| 2004 | Enhancing Collision Attacks. Hervé Ledig, Frédéric Muller, Frédéric Valette |
| 2004 | Fault Analysis of Stream Ciphers. Jonathan J. Hoch, Adi Shamir |
| 2004 | How to Disembed a Program? Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval |
| 2004 | Improving the Security of Dual-Rail Circuits. Danil Sokolov, Julian P. Murphy, Alexandre V. Bystrov, Alexandre Yakovlev |
| 2004 | Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2 Johann Großschädl, Erkay Savas |
| 2004 | Leak Resistant Arithmetic. Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia |
| 2004 | Long Modular Multiplication for Cryptographic Applications. Laszlo Hars |
| 2004 | Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. Erdinç Öztürk, Berk Sunar, Erkay Savas |
| 2004 | Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. Pradeep Kumar Mishra |
| 2004 | Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? François-Xavier Standaert, Siddika Berna Örs, Bart Preneel |
| 2004 | Public Key Authentication with One (Online) Single Addition. Marc Girault, David Lefranc |
| 2004 | Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Loren D. Olson |
| 2004 | Simple Power Analysis of Unified Code for ECC Double and Add. Colin D. Walter |
| 2004 | Strong Authentication for RFID Systems Using the AES Algorithm. Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
| 2004 | Switching Blindings with a View Towards IDEA. Olaf Neiße, Jürgen Pulkus |
| 2004 | TTS: High-Speed Signatures on a Low-Cost Smart Card. Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen |
| 2004 | Towards Efficient Second-Order Power Analysis. Jason Waddle, David A. Wagner |
| 2004 | XTR Implementation on Reconfigurable Hardware. Eric Peeters, Michael Neve, Mathieu Ciet |