Cryptographers' World
 

CHES 2004


[Sort by page number] [Sort by citations count]

 
Marc JoyeJean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Springer, 2004. ISBN 3-540-22666-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Jason Waddle,  David Wagner,  Towards Efficient Second-Order Power Analysis, pp. 1 - 15, CHES 2004.

[Electronic Edition][Cited 90 times Red Star]

Eric Brier,  Christophe Clavier,  Francis Olivier,  Correlation Power Analysis with a Leakage Model, pp. 16 - 29, CHES 2004.

[Electronic Edition][Cited 314 times Red StarRed StarRed Star]

François-Xavier Standaert,  Siddika Berna Örs,  Bart Preneel,  Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?, pp. 30 - 44, CHES 2004.

[Electronic Edition][Cited 45 times ]

Laszlo Hars,  Long Modular Multiplication for Cryptographic Applications, pp. 45 - 61, CHES 2004.

[Electronic Edition][Cited 15 times ]

Jean-Claude Bajard,  Laurent Imbert,  Pierre-Yvan Liardet,  Yannick Teglia,  Leak Resistant Arithmetic, pp. 62 - 75, CHES 2004.

[Electronic Edition][Cited 25 times ]

Soonhak Kwon,  Kris Gaj,  Chang Hoon Kim,  Chun Pyo Hong,   Efficient Linear Array for Multiplication in GF(2 m) Using a Normal Basis for Elliptic Curve Cryptography, pp. 76 - 91, CHES 2004.

[Electronic Edition][Cited 24 times ]

Erdinc Öztürk,  Berk Sunar,  Erkay Savas,  Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic, pp. 92 - 106, CHES 2004.

[Electronic Edition][Cited 36 times ]

Harald Aigner,  Holger Bock,  Markus Hütter,  Johannes Wolkerstorfer,  A Low-Cost ECC Coprocessor for Smartcards, pp. 107 - 118, CHES 2004.

[Electronic Edition][Cited 13 times ]

Nils Gura,  Arun Patel,  Arvinderpal Wander,  Hans Eberle,  Sheueling Chang Shantz,  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, pp. 119 - 132, CHES 2004.

[Electronic Edition][Cited 385 times Red StarRed StarRed Star]

Johann Großschädl,  Erkay Savas,  Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2 m), pp. 133 - 147, CHES 2004.

[Electronic Edition][Cited 38 times ]

Roberto Maria Avanzi,  Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations, pp. 148 - 162, CHES 2004.

[Electronic Edition][Cited 69 times Red Star]

Kai Schramm,  Gregor Leander,  Patrick Felke,  Christof Paar,  A Collision-Attack on AES: Combining Side Channel- and Differential-Attack, pp. 163 - 175, CHES 2004.

[Electronic Edition][Cited 52 times Red Star]

Hervé Ledig,  Frédéric Muller,  Frédéric Valette,  Enhancing Collision Attacks, pp. 176 - 190, CHES 2004.

[Electronic Edition][Cited 30 times ]

Colin D. Walter,  Simple Power Analysis of Unified Code for ECC Double and Add, pp. 191 - 204, CHES 2004.

[Electronic Edition][Cited 19 times ]

Kerstin Lemke-Rust,  Kai Schramm,  Christof Paar,  DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction, pp. 205 - 219, CHES 2004.

[Electronic Edition][Cited 27 times ]

Loren D. Olson,  Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve, pp. 220 - 229, CHES 2004.

[Electronic Edition][Cited 3 times ]

Olaf Neiße,  Jürgen Pulkus,  Switching Blindings with a View Towards IDEA, pp. 230 - 239, CHES 2004.

[Electronic Edition][Cited 4 times ]

Jonathan J. Hoch,  Adi Shamir,  Fault Analysis of Stream Ciphers, pp. 240 - 253, CHES 2004.

[Electronic Edition][Cited 57 times Red Star]

Ludger Hemme,  A Differential Fault Attack Against Early Rounds of (Triple-)DES, pp. 254 - 267, CHES 2004.

[Electronic Edition][Cited 34 times ]

Holger Bock,  Marco Bucci,  Raimondo Luzzi,  An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications, pp. 268 - 281, CHES 2004.

[Electronic Edition][Cited 16 times ]

Danil Sokolov,  Julian Murphy,  Alexandre V. Bystrov,  Alexandre Yakovlev,  Improving the Security of Dual-Rail Circuits, pp. 282 - 297, CHES 2004.

[Electronic Edition][Cited 36 times ]

Yasuyuki Sakai,  Kouichi Sakurai,  A New Attack with Side Channel Leakage During Exponent Recoding Computations, pp. 298 - 311, CHES 2004.

[Electronic Edition][Cited 6 times ]

Pierre-Alain Fouque,  Frédéric Muller,  Guillaume Poupard,  Frédéric Valette,  Defeating Countermeasures Based on Randomized BSD Representations, pp. 312 - 327, CHES 2004.

[Electronic Edition][Cited 24 times ]

Pradeep Kumar Mishra,  Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems, pp. 328 - 342, CHES 2004.

[Electronic Edition][Cited 23 times ]

Hideyo Mamiya,  Atsuko Miyaji,  Hiroaki Morimoto,  Efficient Countermeasures against RPA, DPA, and SPA, pp. 343 - 356, CHES 2004.

[Electronic Edition][Cited 54 times Red Star]

Martin Feldhofer,  Sandra Dominikus,  Johannes Wolkerstorfer,  Strong Authentication for RFID Systems Using the AES Algorithm, pp. 357 - 370, CHES 2004.

[Electronic Edition][Cited 389 times Red StarRed StarRed Star]

Bo-Yin Yang,  Jiun-Ming Chen,  Yen-Hung Chen,  TTS: High-Speed Signatures on a Low-Cost Smart Card, pp. 371 - 385, CHES 2004.

[Electronic Edition][Cited 10 times ]

Eric Peeters,  Michael Neve,  Mathieu Ciet,  XTR Implementation on Reconfigurable Hardware, pp. 386 - 399, CHES 2004.

[Electronic Edition][Cited 13 times ]

Nikhil Joshi,  Kaijie Wu,  Ramesh Karri,  Concurrent Error Detection Schemes for Involution Ciphers, pp. 400 - 412, CHES 2004.

[Electronic Edition][Cited 17 times ]

Marc Girault,  David Lefranc,  Public Key Authentication with One (Online) Single Addition, pp. 413 - 427, CHES 2004.

[Electronic Edition][Cited 21 times ]

Peter J. Leadbitter,  Dan Page,  Nigel P. Smart,  Attacking DSA Under a Repeated Bits Assumption, pp. 428 - 440, CHES 2004.

[Electronic Edition][Cited 5 times ]

Benoît Chevallier-Mames,  David Naccache,  Pascal Paillier,  David Pointcheval,  How to Disembed a Program?, pp. 441 - 454, CHES 2004.

[Electronic Edition][Cited 8 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...