The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptographic Hardware and Embedded Systems (CHES) (ches)
2000 (conf/ches/2000)

  1. Darrel Hankerson, Julio López Hernandez, Alfred Menezes
    Software Implementation of Elliptic Curve Cryptography over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:1-24 [Conf]
  2. Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka
    Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:25-40 [Conf]
  3. Gerardo Orlando, Christof Paar
    A High Performance Reconfigurable Elliptic Curve Processor for GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:41-56 [Conf]
  4. Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee
    Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:57-70 [Conf]
  5. Adi Shamir
    Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:71-77 [Conf]
  6. Rita Mayer-Sommer
    Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:78-92 [Conf]
  7. M. Anwarul Hasan
    Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:93-108 [Conf]
  8. Werner Schindler
    A Timing Attack against RSA with the Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:109-124 [Conf]
  9. Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim
    A Comparative Study of Performance of AES Final Candidates Using FPGAs. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:125-140 [Conf]
  10. Cameron Patterson
    A Dynamic FPGA Implementation of the Serpent Block Cipher. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:141-155 [Conf]
  11. Steven Trimberger, Raymond Pang, Amit Singh
    A 12 Gbps DES Encryptor/Decryptor Core in an FPGA. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:156-163 [Conf]
  12. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer
    A 155 Mbps Triple-DES Network Encryptor. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:164-174 [Conf]
  13. James Goodman, Anantha Chandrakasan
    An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:175-190 [Conf]
  14. Johann Großschädl
    High-Speed RSA Hardware Based on Barret's Modular Reduction Method. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:191-203 [Conf]
  15. Colin D. Walter
    Data Integrity in Hardware for Modular Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:204-215 [Conf]
  16. Takehiko Kato, Satoru Ito, Jun Anzai, Natsume Matsuzaki
    A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:216-228 [Conf]
  17. David Naccache, Michael Tunstall
    How to Explain Side-Channel Leakage to Your Kids. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:229-230 [Conf]
  18. Jean-Sébastien Coron, Louis Goubin
    On Boolean and Arithmetic Masking against Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:231-237 [Conf]
  19. Thomas S. Messerges
    Using Second-Order Power Analysis to Attack DPA Resistant Software. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:238-251 [Conf]
  20. Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous
    Differential Power Analysis in the Presence of Hardware Countermeasures. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:252-263 [Conf]
  21. Huapeng Wu
    Montgomery Multiplier and Squarer in GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:264-276 [Conf]
  22. Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç
    A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:277-292 [Conf]
  23. Gaël Hachez, Jean-Jacques Quisquater
    Montgomery Exponentiation with no Final Subtractions: Improved Results. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:293-301 [Conf]
  24. Steve H. Weingart
    Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:302-317 [Conf]
  25. Thomas Pornin, Jacques Stern
    Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:318-327 [Conf]
  26. Jeffrey Hoffstein, Joseph H. Silverman
    MiniPASS: Authentication and Digital Signatures in a Constrained Environment. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:328-339 [Conf]
  27. Marc Joye, Pascal Paillier, Serge Vaudenay
    Efficient Generation of Prime Numbers. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:340-354 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002