The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptographic Hardware and Embedded Systems (CHES) (ches)
2004 (conf/ches/2004)

  1. Jason Waddle, David Wagner
    Towards Efficient Second-Order Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:1-15 [Conf]
  2. Eric Brier, Christophe Clavier, Francis Olivier
    Correlation Power Analysis with a Leakage Model. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:16-29 [Conf]
  3. François-Xavier Standaert, Siddika Berna Örs, Bart Preneel
    Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:30-44 [Conf]
  4. Laszlo Hars
    Long Modular Multiplication for Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:45-61 [Conf]
  5. Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia
    Leak Resistant Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:62-75 [Conf]
  6. Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong
    Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:76-91 [Conf]
  7. Erdinc Öztürk, Berk Sunar, Erkay Savas
    Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:92-106 [Conf]
  8. Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer
    A Low-Cost ECC Coprocessor for Smartcards. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:107-118 [Conf]
  9. Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:119-132 [Conf]
  10. Johann Großschädl, Erkay Savas
    Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:133-147 [Conf]
  11. Roberto Maria Avanzi
    Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:148-162 [Conf]
  12. Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar
    A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:163-175 [Conf]
  13. Hervé Ledig, Frédéric Muller, Frédéric Valette
    Enhancing Collision Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:176-190 [Conf]
  14. Colin D. Walter
    Simple Power Analysis of Unified Code for ECC Double and Add. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:191-204 [Conf]
  15. Kerstin Lemke, Kai Schramm, Christof Paar
    DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:205-219 [Conf]
  16. Loren D. Olson
    Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:220-229 [Conf]
  17. Olaf Neiße, Jürgen Pulkus
    Switching Blindings with a View Towards IDEA. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:230-239 [Conf]
  18. Jonathan J. Hoch, Adi Shamir
    Fault Analysis of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:240-253 [Conf]
  19. Ludger Hemme
    A Differential Fault Attack Against Early Rounds of (Triple-)DES. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:254-267 [Conf]
  20. Holger Bock, Marco Bucci, Raimondo Luzzi
    An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:268-281 [Conf]
  21. Danil Sokolov, Julian Murphy, Alexandre V. Bystrov, Alexandre Yakovlev
    Improving the Security of Dual-Rail Circuits. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:282-297 [Conf]
  22. Yasuyuki Sakai, Kouichi Sakurai
    A New Attack with Side Channel Leakage During Exponent Recoding Computations. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:298-311 [Conf]
  23. Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette
    Defeating Countermeasures Based on Randomized BSD Representations. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:312-327 [Conf]
  24. Pradeep Kumar Mishra
    Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:328-342 [Conf]
  25. Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
    Efficient Countermeasures against RPA, DPA, and SPA. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:343-356 [Conf]
  26. Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer
    Strong Authentication for RFID Systems Using the AES Algorithm. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:357-370 [Conf]
  27. Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen
    TTS: High-Speed Signatures on a Low-Cost Smart Card. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:371-385 [Conf]
  28. Eric Peeters, Michael Neve, Mathieu Ciet
    XTR Implementation on Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:386-399 [Conf]
  29. Nikhil Joshi, Kaijie Wu, Ramesh Karri
    Concurrent Error Detection Schemes for Involution Ciphers. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:400-412 [Conf]
  30. Marc Girault, David Lefranc
    Public Key Authentication with One (Online) Single Addition. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:413-427 [Conf]
  31. Peter J. Leadbitter, Dan Page, Nigel P. Smart
    Attacking DSA Under a Repeated Bits Assumption. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:428-440 [Conf]
  32. Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
    How to Disembed a Program? [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:441-454 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002