Conferences in DBLP
Jason Waddle , David Wagner Towards Efficient Second-Order Power Analysis. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:1-15 [Conf ] Eric Brier , Christophe Clavier , Francis Olivier Correlation Power Analysis with a Leakage Model. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:16-29 [Conf ] François-Xavier Standaert , Siddika Berna Örs , Bart Preneel Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:30-44 [Conf ] Laszlo Hars Long Modular Multiplication for Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:45-61 [Conf ] Jean-Claude Bajard , Laurent Imbert , Pierre-Yvan Liardet , Yannick Teglia Leak Resistant Arithmetic. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:62-75 [Conf ] Soonhak Kwon , Kris Gaj , Chang Hoon Kim , Chun Pyo Hong Efficient Linear Array for Multiplication in GF(2m ) Using a Normal Basis for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:76-91 [Conf ] Erdinc Öztürk , Berk Sunar , Erkay Savas Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:92-106 [Conf ] Harald Aigner , Holger Bock , Markus Hütter , Johannes Wolkerstorfer A Low-Cost ECC Coprocessor for Smartcards. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:107-118 [Conf ] Nils Gura , Arun Patel , Arvinderpal Wander , Hans Eberle , Sheueling Chang Shantz Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:119-132 [Conf ] Johann Großschädl , Erkay Savas Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2m ). [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:133-147 [Conf ] Roberto Maria Avanzi Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:148-162 [Conf ] Kai Schramm , Gregor Leander , Patrick Felke , Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:163-175 [Conf ] Hervé Ledig , Frédéric Muller , Frédéric Valette Enhancing Collision Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:176-190 [Conf ] Colin D. Walter Simple Power Analysis of Unified Code for ECC Double and Add. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:191-204 [Conf ] Kerstin Lemke , Kai Schramm , Christof Paar DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:205-219 [Conf ] Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:220-229 [Conf ] Olaf Neiße , Jürgen Pulkus Switching Blindings with a View Towards IDEA. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:230-239 [Conf ] Jonathan J. Hoch , Adi Shamir Fault Analysis of Stream Ciphers. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:240-253 [Conf ] Ludger Hemme A Differential Fault Attack Against Early Rounds of (Triple-)DES. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:254-267 [Conf ] Holger Bock , Marco Bucci , Raimondo Luzzi An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:268-281 [Conf ] Danil Sokolov , Julian Murphy , Alexandre V. Bystrov , Alexandre Yakovlev Improving the Security of Dual-Rail Circuits. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:282-297 [Conf ] Yasuyuki Sakai , Kouichi Sakurai A New Attack with Side Channel Leakage During Exponent Recoding Computations. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:298-311 [Conf ] Pierre-Alain Fouque , Frédéric Muller , Guillaume Poupard , Frédéric Valette Defeating Countermeasures Based on Randomized BSD Representations. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:312-327 [Conf ] Pradeep Kumar Mishra Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:328-342 [Conf ] Hideyo Mamiya , Atsuko Miyaji , Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:343-356 [Conf ] Martin Feldhofer , Sandra Dominikus , Johannes Wolkerstorfer Strong Authentication for RFID Systems Using the AES Algorithm. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:357-370 [Conf ] Bo-Yin Yang , Jiun-Ming Chen , Yen-Hung Chen TTS: High-Speed Signatures on a Low-Cost Smart Card. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:371-385 [Conf ] Eric Peeters , Michael Neve , Mathieu Ciet XTR Implementation on Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:386-399 [Conf ] Nikhil Joshi , Kaijie Wu , Ramesh Karri Concurrent Error Detection Schemes for Involution Ciphers. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:400-412 [Conf ] Marc Girault , David Lefranc Public Key Authentication with One (Online) Single Addition. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:413-427 [Conf ] Peter J. Leadbitter , Dan Page , Nigel P. Smart Attacking DSA Under a Repeated Bits Assumption. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:428-440 [Conf ] Benoît Chevallier-Mames , David Naccache , Pascal Paillier , David Pointcheval How to Disembed a Program? [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:441-454 [Conf ]