


default search action
5. CHES 2003: Cologne, Germany
- Colin D. Walter, Çetin Kaya Koç, Christof Paar:

Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2779, Springer 2003, ISBN 3-540-40833-9
Invited Talk
- Frank Stajano:

The Security Challenges of Ubiquitous Computing. 1
Side Channel Attack Methodology
- Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi:

Multi-channel Attacks. 2-16 - Chris Karlof, David A. Wagner:

Hidden Markov Model Cryptanalysis. 17-34 - Siddika Berna Örs

, Elisabeth Oswald
, Bart Preneel:
Power-Analysis Attacks on an FPGA - First Experimental Results. 35-50
Hardware Factorization
- Willi Geiselmann, Rainer Steinwandt:

Hardware to Solve Sparse Systems of Linear Equations over GF(2). 51-61
Symmetric Ciphers: Side Channel Attacks and Countermeasures
- Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi:

Cryptanalysis of DES Implemented on Computers with Cache. 62-76 - Gilles Piret, Jean-Jacques Quisquater:

A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. 77-88 - Jean-Sébastien Coron, Alexei Tchulkine:

A New Algorithm for Switching from Arithmetic to Boolean Masking. 89-97 - Jovan Dj. Golic:

DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. 98-112
Secure Hardware Logic
- Ramesh Karri, Grigori Kuznetsov, Michael Gössel:

Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. 113-124 - Kris Tiri, Ingrid Verbauwhede

:
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. 125-136 - Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert Mullins

, George S. Taylor:
Security Evaluation of Asynchronous Circuits. 137-151
Random Number Generators
- Michael Epstein, Laszlo Hars, Raymond Krasinski, Martin Rosner, Hao Zheng:

Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts. 152-165 - Boaz Barak, Ronen Shaltiel, Eran Tromer

:
True Random Number Generators Secure in a Changing Environment. 166-180 - Markus Dichtl:

How to Predict the Output of a Hardware Random Number Generator. 181-188
Efficient Multiplication
- Arash Reyhani-Masoleh, M. Anwarul Hasan:

On Low Complexity Bit Parallel Polynomial Basis Multipliers. 189-202 - Jean-François Dhem:

Efficient Modular Reduction Algorithm in IFq[x] and Its Application to "Left to Right" Modular Multiplication in IF2[x]. 203-213 - Benoît Chevallier-Mames, Marc Joye, Pascal Paillier:

Faster Double-Size Modular Multiplication from Euclidean Multipliers. 214-227
More on Efficient Artihmetic
- Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong:

Efficient Exponentiation for a Class of Finite Fields GF(2 n) Determined by Gauss Periods. 228-242 - Marc Joye, Pascal Paillier:

GCD-Free Algorithms for Computing Modular Inverses. 243-253
Attacks on Asymmetric Cryptosystems
- Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard:

Attacking Unbalanced RSA-CRT Using SPA. 254-268 - Pierre-Alain Fouque

, Frédéric Valette:
The Doubling Attack - Why Upwards Is Better than Downwards. 269-280 - Nigel P. Smart:

An Analysis of Goubin's Refined Power Analysis Attack. 281-290 - Julien Cathalo, François Koeune, Jean-Jacques Quisquater:

A New Type of Timing Attack: Application to GPS. 291-303
Implementation of Symmetric Ciphers
- Akashi Satoh, Sumio Morioka

:
Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia. 304-318 - Pawel Chodowiec, Kris Gaj:

Very Compact FPGA Implementation of the AES Algorithm. 319-333 - François-Xavier Standaert

, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. 334-350
Hyperelliptic Curve Cryptography
- Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Christof Paar:

Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. 351-365 - Roberto Maria Avanzi:

Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. 366-381
Countermeasures to Side Channel Leakage
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka:

A Practical Countermeasure against Address-Bit Differential Power Analysis. 382-396 - Katsuyuki Okeya, Tsuyoshi Takagi:

A More Flexible Countermeasure against Side Channel Attacks Using Window Method. 397-410
Security of Standards
- Jolyon Clulow:

On the Security of PKCS#11. 411-425 - Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa:

Attacking RSA-Based Sessions in SSL/TLS. 426-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














