CHES A

33 papers

YearTitle / Authors
2004A Collision-Attack on AES: Combining Side Channel- and Differential-Attack.
Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar
2004A Differential Fault Attack Against Early Rounds of (Triple-)DES.
Ludger Hemme
2004A Low-Cost ECC Coprocessor for Smartcards.
Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer
2004A New Attack with Side Channel Leakage During Exponent Recoding Computations.
Yasuyuki Sakai, Kouichi Sakurai
2004An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications.
Holger Bock, Marco Bucci, Raimondo Luzzi
2004Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations.
Roberto Maria Avanzi
2004Attacking DSA Under a Repeated Bits Assumption.
Peter James Leadbitter, Dan Page, Nigel P. Smart
2004Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz
2004Concurrent Error Detection Schemes for Involution Ciphers.
Nikhil Joshi, Kaijie Wu, Ramesh Karri
2004Correlation Power Analysis with a Leakage Model.
Eric Brier, Christophe Clavier, Francis Olivier
2004Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Marc Joye, Jean-Jacques Quisquater
2004DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.
Kerstin Lemke, Kai Schramm, Christof Paar
2004Defeating Countermeasures Based on Randomized BSD Representations.
Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette
2004Efficient Countermeasures against RPA, DPA, and SPA.
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
2004Efficient Linear Array for Multiplication in GF(2
Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong
2004Enhancing Collision Attacks.
Hervé Ledig, Frédéric Muller, Frédéric Valette
2004Fault Analysis of Stream Ciphers.
Jonathan J. Hoch, Adi Shamir
2004How to Disembed a Program?
Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
2004Improving the Security of Dual-Rail Circuits.
Danil Sokolov, Julian P. Murphy, Alexandre V. Bystrov, Alexandre Yakovlev
2004Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2
Johann Großschädl, Erkay Savas
2004Leak Resistant Arithmetic.
Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia
2004Long Modular Multiplication for Cryptographic Applications.
Laszlo Hars
2004Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.
Erdinç Öztürk, Berk Sunar, Erkay Savas
2004Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems.
Pradeep Kumar Mishra
2004Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
François-Xavier Standaert, Siddika Berna Örs, Bart Preneel
2004Public Key Authentication with One (Online) Single Addition.
Marc Girault, David Lefranc
2004Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve.
Loren D. Olson
2004Simple Power Analysis of Unified Code for ECC Double and Add.
Colin D. Walter
2004Strong Authentication for RFID Systems Using the AES Algorithm.
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer
2004Switching Blindings with a View Towards IDEA.
Olaf Neiße, Jürgen Pulkus
2004TTS: High-Speed Signatures on a Low-Cost Smart Card.
Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen
2004Towards Efficient Second-Order Power Analysis.
Jason Waddle, David A. Wagner
2004XTR Implementation on Reconfigurable Hardware.
Eric Peeters, Michael Neve, Mathieu Ciet