The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptographic Hardware and Embedded Systems (CHES) (ches)
2001 (conf/ches/2001)

  1. Ross J. Anderson
    Protecting Embedded Systems - The Next Ten Years. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:1-2 [Conf]
  2. Louis Goubin
    A Sound Method for Switching between Boolean and Arithmetic Masking. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:3-15 [Conf]
  3. Eric Brier, Helena Handschuh, Christophe Tymen
    Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:16-27 [Conf]
  4. David May, Henk L. Muller, Nigel P. Smart
    Random Register Renaming to Foil DPA. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:28-38 [Conf]
  5. Elisabeth Oswald, Manfred Josef Aigner
    Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:39-50 [Conf]
  6. Henry Kuo, Ingrid Verbauwhede
    Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:51-64 [Conf]
  7. Máire McLoone, John V. McCanny
    High Performance Single-Chip FPGA Rijndael Algorithm Implementations. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:65-76 [Conf]
  8. Viktor Fischer, Milos Drutarovský
    Two Methods of Rijndael Implementation in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:77-92 [Conf]
  9. Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro
    Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:93-102 [Conf]
  10. Werner Schindler
    Efficient Online Tests for True Random Number Generators. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:103-117 [Conf]
  11. Nigel P. Smart
    The Hessian Form of an Elliptic Curve. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:118-125 [Conf]
  12. Katsuyuki Okeya, Kouichi Sakurai
    Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:126-141 [Conf]
  13. Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç
    Generating Elliptic Curves of Prime Order. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:142-158 [Conf]
  14. Adi Shamir
    New Directions in Croptography. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:159- [Conf]
  15. Manuel Leone
    A New Low Complexity Parallel Multiplier for a Class of Finite Fields. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:160-170 [Conf]
  16. Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi
    Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:171-184 [Conf]
  17. Alexandre F. Tenca, Georgi Todorov, Çetin Kaya Koç
    High-Radix Design of a Scalable Modular Multiplier. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:185-201 [Conf]
  18. Johann Großschädl
    A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:202-219 [Conf]
  19. Mike Bond
    Attacks on Cryptoprocessor Transaction Sets. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:220-234 [Conf]
  20. Adam Young, Moti Yung
    Bandwidth-Optimal Kleptographic Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:235-250 [Conf]
  21. Karine Gandolfi, Christophe Mourtel, Francis Olivier
    Electromagnetic Analysis: Concrete Results. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:251-261 [Conf]
  22. Daniel V. Bailey, Daniel Coffin, Adam J. Elbirt, Joseph H. Silverman, Adam D. Woodbury
    NTRU in Constrained Devices. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:262-272 [Conf]
  23. Thomas Pornin
    Transparent Harddisk Encryption. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:273-285 [Conf]
  24. Colin D. Walter
    Sliding Windows Succumbs to Big Mac Attack. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:286-299 [Conf]
  25. Christophe Clavier, Marc Joye
    Universal Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:300-308 [Conf]
  26. Mehdi-Laurent Akkar, Christophe Giraud
    An Implementation of DES and AES, Secure against Some Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:309-318 [Conf]
  27. Palash Sarkar, Subhamoy Maitra
    Efficient Implementation of "Large" Stream Cipher Systems. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:319-332 [Conf]
  28. Ocean Y. H. Cheung, Kuen Hung Tsoi, Philip Heng Wai Leong, M. P. Leong
    Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:333-347 [Conf]
  29. Gerardo Orlando, Christof Paar
    A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:348-363 [Conf]
  30. Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura
    Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:364-376 [Conf]
  31. Marc Joye, Christophe Tymen
    Protections against Differential Analysis for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:377-390 [Conf]
  32. Pierre-Yvan Liardet, Nigel P. Smart
    Preventing SPA/DPA in ECC Systems Using the Jacobi Form. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:391-401 [Conf]
  33. Marc Joye, Jean-Jacques Quisquater
    Hessian Elliptic Curves and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:402-410 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002