5. ISC 2002:
Sao Paulo, Brazil
Intrusion Detection and Tamper Resistance
: On the Difficulty of Protecting Private Keys in Software.
Cryptographic Algorithm and Attack Implementation
Access Control and Trust Management (I)
Authentication and Privacy
, Heuisu Ryu
: Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2m).
Access Control and Trust Management (II)
: Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
E-commerce Protocols (II)
, Kouichi Sakurai
: Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.