The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptographic Hardware and Embedded Systems (CHES) (ches)
2007 (conf/ches/2007)

  1. Joshua Jaffe
    A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:1-13 [Conf]
  2. Kerstin Lemke-Rust, Christof Paar
    Gaussian Mixture Models for Higher-Order Side Channel Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:14-27 [Conf]
  3. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain
    Side Channel Cryptanalysis of a Higher Order Masking Scheme. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:28-44 [Conf]
  4. Markus Dichtl, Jovan Dj. Golic
    High-Speed True Random Number Generation with Logic Gates Only. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:45-62 [Conf]
  5. Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls
    FPGA Intrinsic PUFs and Their Use for IP Protection. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:63-80 [Conf]
  6. Thomas Popp, Mario Kirschbaum, Thomas Zefferer, Stefan Mangard
    Evaluation of the Masked Logic Style MDPL on a Prototype Chip. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:81-94 [Conf]
  7. Patrick Schaumont, Kris Tiri
    Masking and Dual-Rail Logic Don't Add Up. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:95-106 [Conf]
  8. Benedikt Gierlichs
    DPA-Resistance Without Routing Constraints? [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:107-120 [Conf]
  9. Mitsuru Matsui, Junko Nakajima
    On the Power of Bitslice Implementation on Intel Core2 Processor. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:121-134 [Conf]
  10. Marc Joye
    Highly Regular Right-to-Left Algorithms for Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:135-147 [Conf]
  11. Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük, Bart Preneel
    MAME: A Compression Function with Reduced Hardware Requirements. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:148-165 [Conf]
  12. Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper
    Collision Attacks on AES-Based MAC: Alpha-MAC. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:166-180 [Conf]
  13. Christophe Clavier
    Secret External Encodings Do Not Prevent Transient Fault Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:181-194 [Conf]
  14. Alex Biryukov, Dmitry Khovratovich
    Two New Techniques of Side-Channel Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:195-208 [Conf]
  15. Owen Harrison, John Waldron
    AES Encryption Implementation and Analysis on Commodity Graphics Processing Units. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:209-226 [Conf]
  16. Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert Felber, Matthias Braendli
    Multi-gigabit GCM-AES Architecture Optimized for FPGAs. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:227-238 [Conf]
  17. Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
    Arithmetic Operators for Pairing-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:239-255 [Conf]
  18. Kimmo U. Järvinen, Juha Forsten, Jorma Skyttä
    FPGA Design of Self-certified Signature Verification on Koblitz Curves. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:256-271 [Conf]
  19. Daisuke Suzuki
    How to Maximize the Potential of FPGA Resources for Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:272-288 [Conf]
  20. Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin
    TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:289-302 [Conf]
  21. Stefan Tillich, Johann Großschädl
    Power Analysis Resistant AES Implementation with Instruction Set Extensions. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:303-319 [Conf]
  22. Michael Hutter, Stefan Mangard, Martin Feldhofer
    Power and EM Attacks on Passive 13.56 MHz RFID Devices. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:320-333 [Conf]
  23. O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert, J. Reverdy
    RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:334-345 [Conf]
  24. Gerald DeJean, Darko Kirovski
    RF-DNA: Radio-Frequency Certificates of Authenticity. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:346-363 [Conf]
  25. Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
    CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:364-377 [Conf]
  26. Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater
    Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:378-393 [Conf]
  27. Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
    A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:394-412 [Conf]
  28. Bruno Robisson, Pascal Manet
    Differential Behavioral Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:413-426 [Conf]
  29. François Macé, François-Xavier Standaert, Jean-Jacques Quisquater
    Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:427-442 [Conf]
  30. Christophe Clavier, Jean-Sébastien Coron
    On the Implementation of a Fast Prime Generation Algorithm. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:443-449 [Conf]
  31. Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe
    PRESENT: An Ultra-Lightweight Block Cipher. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:450-466 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002