Conferences in DBLP
Ross J. Anderson Protecting Embedded Systems - The Next Ten Years. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:1-2 [Conf ] Louis Goubin A Sound Method for Switching between Boolean and Arithmetic Masking. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:3-15 [Conf ] Eric Brier , Helena Handschuh , Christophe Tymen Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:16-27 [Conf ] David May , Henk L. Muller , Nigel P. Smart Random Register Renaming to Foil DPA. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:28-38 [Conf ] Elisabeth Oswald , Manfred Josef Aigner Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:39-50 [Conf ] Henry Kuo , Ingrid Verbauwhede Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:51-64 [Conf ] Máire McLoone , John V. McCanny High Performance Single-Chip FPGA Rijndael Algorithm Implementations. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:65-76 [Conf ] Viktor Fischer , Milos Drutarovský Two Methods of Rijndael Implementation in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:77-92 [Conf ] Nick Howgrave-Graham , Joan G. Dyer , Rosario Gennaro Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:93-102 [Conf ] Werner Schindler Efficient Online Tests for True Random Number Generators. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:103-117 [Conf ] Nigel P. Smart The Hessian Form of an Elliptic Curve. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:118-125 [Conf ] Katsuyuki Okeya , Kouichi Sakurai Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:126-141 [Conf ] Erkay Savas , Thomas A. Schmidt , Çetin Kaya Koç Generating Elliptic Curves of Prime Order. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:142-158 [Conf ] Adi Shamir New Directions in Croptography. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:159- [Conf ] Manuel Leone A New Low Complexity Parallel Multiplier for a Class of Finite Fields. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:160-170 [Conf ] Atri Rudra , Pradeep K. Dubey , Charanjit S. Jutla , Vijay Kumar , Josyula R. Rao , Pankaj Rohatgi Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:171-184 [Conf ] Alexandre F. Tenca , Georgi Todorov , Çetin Kaya Koç High-Radix Design of a Scalable Modular Multiplier. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:185-201 [Conf ] Johann Großschädl A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m ). [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:202-219 [Conf ] Mike Bond Attacks on Cryptoprocessor Transaction Sets. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:220-234 [Conf ] Adam Young , Moti Yung Bandwidth-Optimal Kleptographic Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:235-250 [Conf ] Karine Gandolfi , Christophe Mourtel , Francis Olivier Electromagnetic Analysis: Concrete Results. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:251-261 [Conf ] Daniel V. Bailey , Daniel Coffin , Adam J. Elbirt , Joseph H. Silverman , Adam D. Woodbury NTRU in Constrained Devices. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:262-272 [Conf ] Thomas Pornin Transparent Harddisk Encryption. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:273-285 [Conf ] Colin D. Walter Sliding Windows Succumbs to Big Mac Attack. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:286-299 [Conf ] Christophe Clavier , Marc Joye Universal Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:300-308 [Conf ] Mehdi-Laurent Akkar , Christophe Giraud An Implementation of DES and AES, Secure against Some Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:309-318 [Conf ] Palash Sarkar , Subhamoy Maitra Efficient Implementation of "Large" Stream Cipher Systems. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:319-332 [Conf ] Ocean Y. H. Cheung , Kuen Hung Tsoi , Philip Heng Wai Leong , M. P. Leong Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:333-347 [Conf ] Gerardo Orlando , Christof Paar A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:348-363 [Conf ] Hanae Nozaki , Masahiko Motoyama , Atsushi Shimbo , Shin-ichi Kawamura Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:364-376 [Conf ] Marc Joye , Christophe Tymen Protections against Differential Analysis for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:377-390 [Conf ] Pierre-Yvan Liardet , Nigel P. Smart Preventing SPA/DPA in ECC Systems Using the Jacobi Form. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:391-401 [Conf ] Marc Joye , Jean-Jacques Quisquater Hessian Elliptic Curves and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:402-410 [Conf ]