


default search action
1. CHES 1999: Worcester, MA, USA
- Çetin Kaya Koç, Christof Paar:

Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings. Lecture Notes in Computer Science 1717, Springer 1999, ISBN 3-540-66646-X
Invited Talk
- Brian D. Snow:

We Need Assurance. 1
Cryptanalytic Hardware
- Adi Shamir:

Factoring Large Numbers with the Twinkle Device (Extended Abstract). 2-12 - Ivan Hamer, Paul Chow:

DES Cracking on the Transmogrifier 2a. 13-24
Hardware Architectures
- W. P. Choi, Lee-Ming Cheng

:
Modelling the Crypto-Processor from Design to Synthesis. 25-36 - D. Craig Wilcox, Lyndon G. Pierson, Perry J. Robertson, Edward L. Witzke, Karl Gass:

A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond. 37-48 - Eunjong Hong, Jai-Hoon Chung, Chae Hoon Lim:

Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton. 49-60
Smartcards and Embedded Systems
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara:

Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. 61-72 - Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim:

How to Implement Cost-Effective and Secure Public Key Cryptosystems. 73-79
Invited Talk
- Colin D. Walter:

Montgomery's Multiplication Technique: How to Make It Smaller and Faster. 80-93
Arithmetic Algorithms I
- Alexandre F. Tenca, Çetin Kaya Koç:

A Scalable Architecture for Montgomery Multiplication. 94-108 - Tamás Horváth:

Arithmetic Design for Permutation Groups. 109-121 - Joseph H. Silverman:

Fast Multiplication in Finite Fields GF(2N). 122-134 - Burton S. Kaliski Jr., Moses D. Liskov:

Efficient Finite Field Basis Conversion Involving Dual Bases. 135-143
Power Attacks I
- Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan:

Power Analysis Attacks of Modular Exponentiation in Smartcards. 144-157 - Louis Goubin, Jacques Patarin:

DES and Differential Power Analysis (The "Duplication" Method). 158-172 - Paul N. Fahn, Peter K. Pearson:

IPA: A New Class of Power Attacks. 173-186
Invited Talk
- Eberhard von Faber:

Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems. 187-203
True Random Number Generators
- Vittorio Bagini, Marco Bucci:

A Design of Reliable True Random Number Generator for Cryptographic Applications. 204-218 - David Paul Maher, Robert J. Rance:

Random Number Generators Founded on Signal and Information Theory. 219-230
Cryptographic Algorithms on FPGAs
- R. Reed Taylor, Seth Copen Goldstein:

A High-Performance Flexible Architecture for Cryptography. 231-245 - Emeka Mosanya, Christof Teuscher, Héctor Fabio Restrepo, Patrick Galley, Eduardo Sanchez:

CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor. 246-256 - Lijun Gao, Sarvesh Shrivastava, Gerald E. Sobelman:

Elliptic Curve Scalar Multiplier Design Using FPGAs. 257-268
Arithmetic Algorithms II
- Huapeng Wu, M. Anwarul Hasan, Ian F. Blake:

Highly Regular Architectures for Finite Field Computation Using Redundant Basis. 269-279 - Huapeng Wu:

Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis. 280-291
Power Attacks II
- Jean-Sébastien Coron:

Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. 292-302 - Helena Handschuh, Pascal Paillier, Jacques Stern:

Probing Attacks on Tamper-Resistant Devices. 303-315
Elliptic Curve Implementations
- Julio López, Ricardo Dahab:

Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation. 316-327
New Cryptographic Schemes and Modes of Operation
- Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi:

NICE - New Ideal Coset Encryption. 328-339 - Oliver Jung, Christoph Ruland:

Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. 340-352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














