Cryptographers' World
 

CHES 2002


[Sort by page number] [Sort by citations count]

 
Burton S. Kaliski Jr.├çetin Kaya Ko├žChristof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer, 2003. ISBN 3-540-00409-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Jean-Jacques Quisquater,  CHES: Past, Present, and Future, pp. 1 - 1, CHES 2002.

[Electronic Edition][No citation]

Sergei P. Skorobogatov,  Ross J. Anderson,  Optical Fault Induction Attacks, pp. 2 - 12, CHES 2002.

[Electronic Edition][Cited 246 times Red StarRed Star]

Suresh Chari,  Josyula R. Rao,  Pankaj Rohatgi,  Template Attacks, pp. 13 - 28, CHES 2002.

[Electronic Edition][Cited 192 times Red StarRed Star]

Dakshi Agrawal,  Bruce Archambeault,  Josyula R. Rao,  Pankaj Rohatgi,  The EM Side-Channel(s), pp. 29 - 45, CHES 2002.

[Electronic Edition][Cited 262 times Red StarRed StarRed Star]

Shay Gueron,  Enhanced Montgomery Multiplication, pp. 46 - 56, CHES 2002.

[Electronic Edition][Cited 11 times ]

R├│bert L├│rencz,  New Algorithm for Classical Modular Inverse, pp. 57 - 70, CHES 2002.

[Electronic Edition][Cited 18 times ]

Wieland Fischer,  Jean-Pierre Seifert,  Increasing the Bitlength of a Crypto-Coprocessor, pp. 71 - 81, CHES 2002.

[Electronic Edition][Cited 17 times ]

Elisabeth Oswald,  Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems, pp. 82 - 97, CHES 2002.

[Electronic Edition][Cited 36 times ]

Elena Trichina,  Antonio Bellezza,  Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks, pp. 98 - 113, CHES 2002.

[Electronic Edition][Cited 28 times ]

Catherine H. Gebotys,  Robert J. Gebotys,  Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor, pp. 114 - 128, CHES 2002.

[Electronic Edition][Cited 40 times ]

Kouichi Itoh,  Tetsuya Izu,  Masahiko Takenaka,  Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA, pp. 129 - 143, CHES 2002.

[Electronic Edition][Cited 47 times ]

A. K. Lutz,  J. Treichler,  Frank K. G├╝rkaynak,  Hubert Kaeslin,  G. Basler,  Antonia Erni,  S. Reichmuth,  P. Rommens,  Stephan Oetiker,  Wolfgang Fichtner,  2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis, pp. 144 - 158, CHES 2002.

[Electronic Edition][Cited 18 times ]

Guido Bertoni,  Luca Breveglieri,  Pasqualina Fragneto,  Marco Macchetti,  Stefano Marchesin,  Efficient Software Implementation of AES on 32-Bit Platforms, pp. 159 - 171, CHES 2002.

[Electronic Edition][Cited 60 times Red Star]

Sumio Morioka,  Akashi Satoh,  An Optimized S-Box Circuit Architecture for Low Power AES Design, pp. 172 - 186, CHES 2002.

[Electronic Edition][Cited 118 times Red StarRed Star]

Elena Trichina,  Domenico De Seta,  Lucia Germani,  Simplified Adaptive Multiplicative Masking for AES, pp. 187 - 197, CHES 2002.

[Electronic Edition][Cited 89 times Red Star]

Jovan Dj. Golic,  Christophe Tymen,  Multiplicative Masking and Power Analysis of AES, pp. 198 - 212, CHES 2002.

[Electronic Edition][Cited 150 times Red StarRed Star]

Andrew Huang,  Keeping Secrets in Hardware: The Microsoft Xbox Case Study, pp. 213 - 227, CHES 2002.

[Electronic Edition][Cited 75 times Red Star]

Bert den Boer,  Kerstin Lemke-Rust,  Guntram Wicke,  A DPA Attack against the Modular Reduction within a CRT Implementation of RSA, pp. 228 - 243, CHES 2002.

[Electronic Edition][Cited 38 times ]

Vlastimil Kl├şma,  Tom├ís Rosa,  Further Results and Considerations on Side Channel Attacks on RSA, pp. 244 - 259, CHES 2002.

[Electronic Edition][Cited 18 times ]

Christian Aum├╝ller,  Peter Bier,  Wieland Fischer,  Peter Hofreiter,  Jean-Pierre Seifert,  Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, pp. 260 - 275, CHES 2002.

[Electronic Edition][Cited 95 times Red Star]

Colin D. Walter,  Some Security Aspects of the M IST Randomized Exponentiation Algorithm, pp. 276 - 290, CHES 2002.

[Electronic Edition][Cited 4 times ]

Marc Joye,  Sung-Ming Yen,  The Montgomery Powering Ladder, pp. 291 - 302, CHES 2002.

[Electronic Edition][Cited 140 times Red StarRed Star]

Kouichi Itoh,  Jun Yajima,  Masahiko Takenaka,  Naoya Torii,  DPA Countermeasures by Improving the Window Method, pp. 303 - 317, CHES 2002.

[Electronic Edition][Cited 56 times Red Star]

Martijn Stam,  Arjen K. Lenstra,  Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions, pp. 318 - 332, CHES 2002.

[Electronic Edition][Cited 31 times ]

Elisavet Konstantinou,  Yannis C. Stamatiou,  Christos D. Zaroliagis,  On the Efficient Generation of Elliptic Curves over Prime Fields, pp. 333 - 348, CHES 2002.

[Electronic Edition][Cited 13 times ]

Nils Gura,  Sheueling Chang Shantz,  Hans Eberle,  Sumit Gupta,  Vipul Gupta,  Daniel Finchelstein,  Edouard Goupy,  Douglas Stebila,  An End-to-End Systems Approach to Elliptic Curve Cryptography, pp. 349 - 365, CHES 2002.

[Electronic Edition][Cited 111 times Red StarRed Star]

Richard Schroeppel,  Cheryl L. Beaver,  Rita Gonzales,  Russell Miller,  Timothy Draelos,  A Low-Power Design for an Elliptic Curve Digital Signature Chip, pp. 366 - 380, CHES 2002.

[Electronic Edition][Cited 34 times ]

Matthias Ernst,  M. Jung,  F. Madlener,  S. Huss,  Rainer Bl├╝mel,  A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2, pp. 381 - 399, CHES 2002.

[Electronic Edition][Cited 74 times Red Star]

N. Boston,  T. Clancy,  Y. Liow,  J. Webster,  Genus Two Hyperelliptic Curve Coprocessor, pp. 400 - 414, CHES 2002.

[Electronic Edition][Cited 34 times ]

Viktor Fischer,  Milos Drutarovsk├Ż,  True Random Number Generator Embedded in Reconfigurable Hardware, pp. 415 - 430, CHES 2002.

[Electronic Edition][Cited 65 times Red Star]

Werner Schindler,  Wolfgang Killmann,  Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications, pp. 431 - 449, CHES 2002.

[Electronic Edition][Cited 36 times ]

Thomas E. Tkacik,  A Hardware Random Number Generator, pp. 450 - 453, CHES 2002.

[Electronic Edition][Cited 34 times ]

Sanjay E. Sarma,  Stephen A. Weis,  Daniel W. Engels,  RFID Systems and Security and Privacy Implications, pp. 454 - 469, CHES 2002.

[Electronic Edition][Cited 468 times Red StarRed StarRed Star]

Alexander Klimov,  Adi Shamir,  A New Class of Invertible Mappings, pp. 470 - 483, CHES 2002.

[Electronic Edition][Cited 86 times Red Star]

Adnan Abdul-Aziz Gutub,  Alexandre F. Tenca,  Erkay Savas,  ├çetin Kaya Ko├ž,  Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2), pp. 484 - 499, CHES 2002.

[Electronic Edition][Cited 46 times ]

Johannes Wolkerstorfer,  Dual-Field Arithmetic Unit for GF(p) and GF(2, pp. 500 - 514, CHES 2002.

[Electronic Edition][Cited 47 times ]

Arash Reyhani-Masoleh,  M. Anwar Hasan,  Error Detection in Polynomial Basis Multipliers over Binary Extension Fields, pp. 515 - 528, CHES 2002.

[Electronic Edition][Cited 24 times ]

Dan Page,  Nigel P. Smart,  Hardware Implementation of Finite Fields of Characteristic Three, pp. 529 - 539, CHES 2002.

[Electronic Edition][Cited 59 times Red Star]

Mathieu Ciet,  Jean-Jacques Quisquater,  Francesco Sica,  Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication, pp. 540 - 550, CHES 2002.

[Electronic Edition][Cited 11 times ]

JaeCheol Ha,  Sang-Jae Moon,  Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks, pp. 551 - 563, CHES 2002.

[Electronic Edition][Cited 71 times Red Star]

Katsuyuki Okeya,  Kouichi Sakurai,  Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick, pp. 564 - 578, CHES 2002.

[Electronic Edition][Cited 12 times ]

Richard Clayton,  Mike Bond,  Experience Using a Low-Cost FPGA Design to Crack DES Keys, pp. 579 - 592, CHES 2002.

[Electronic Edition][Cited 32 times ]

Fran├žois-Xavier Standaert,  Ga├źl Rouvroy,  Jean-Jacques Quisquater,  Jean-Didier Legat,  A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results, pp. 593 - 609, CHES 2002.

[Electronic Edition][Cited 32 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...