Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ches/ches2000.bht:"
@inproceedings{DBLP:conf/ches/ChungSL00, author = {Jae Wook Chung and Sang Gyoo Sim and Pil Joong Lee}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Fast Implementation of Elliptic Curve Defined over GF(\emph{p}\({}^{\mbox{m}}\)) on CalmRISC with {MAC2424} Coprocessor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {57--70}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_4}, doi = {10.1007/3-540-44499-8\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChungSL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClavierCD00, author = {Christophe Clavier and Jean{-}S{\'{e}}bastien Coron and Nora Dabbous}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Differential Power Analysis in the Presence of Hardware Countermeasures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {252--263}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_20}, doi = {10.1007/3-540-44499-8\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ClavierCD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronG00, author = {Jean{-}S{\'{e}}bastien Coron and Louis Goubin}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {On Boolean and Arithmetic Masking against Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {231--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_18}, doi = {10.1007/3-540-44499-8\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DandalisPR00, author = {Andreas Dandalis and Viktor K. Prasanna and Jos{\'{e}} D. P. Rolim}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Comparative Study of Performance of {AES} Final Candidates Using FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {125--140}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_9}, doi = {10.1007/3-540-44499-8\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DandalisPR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoodmanC00, author = {James Goodman and Anantha P. Chandrakasan}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {175--190}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_13}, doi = {10.1007/3-540-44499-8\_13}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoodmanC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Grossschadl00, author = {Johann Gro{\ss}sch{\"{a}}dl}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {High-Speed {RSA} Hardware Based on Barret's Modular Reduction Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {191--203}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_14}, doi = {10.1007/3-540-44499-8\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Grossschadl00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HachezQ00, author = {Ga{\"{e}}l Hachez and Jean{-}Jacques Quisquater}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Montgomery Exponentiation with no Final Subtractions: Improved Results}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {293--301}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_23}, doi = {10.1007/3-540-44499-8\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HachezQ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HankersonHM00, author = {Darrel Hankerson and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Alfred Menezes}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Software Implementation of Elliptic Curve Cryptography over Binary Fields}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {1--24}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_1}, doi = {10.1007/3-540-44499-8\_1}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HankersonHM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Hasan00, author = {M. Anwarul Hasan}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {93--108}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_7}, doi = {10.1007/3-540-44499-8\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Hasan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HoffsteinS00, author = {Jeffrey Hoffstein and Joseph H. Silverman}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {MiniPASS: Authentication and Digital Signatures in a Constrained Environment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {328--339}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_26}, doi = {10.1007/3-540-44499-8\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HoffsteinS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePV00, author = {Marc Joye and Pascal Paillier and Serge Vaudenay}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Generation of Prime Numbers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {340--354}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_27}, doi = {10.1007/3-540-44499-8\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KatoIAM00, author = {Takehiko Kato and Satoru Ito and Jun Anzai and Natsume Matsuzaki}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {216--228}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_16}, doi = {10.1007/3-540-44499-8\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KatoIAM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeitoldMPPPW00, author = {Herbert Leitold and Wolfgang Mayerwieser and Udo Payer and Karl C. Posch and Reinhard Posch and Johannes Wolkerstorfer}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A 155 Mbps Triple-DES Network Encryptor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {164--174}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_12}, doi = {10.1007/3-540-44499-8\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeitoldMPPPW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Mayer-Sommer00, author = {Rita Mayer{-}Sommer}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {78--92}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_6}, doi = {10.1007/3-540-44499-8\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Mayer-Sommer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Messerges00, author = {Thomas S. Messerges}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Using Second-Order Power Analysis to Attack {DPA} Resistant Software}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {238--251}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_19}, doi = {10.1007/3-540-44499-8\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Messerges00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/NaccacheT00, author = {David Naccache and Michael Tunstall}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {How to Explain Side-Channel Leakage to Your Kids}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {229--230}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_17}, doi = {10.1007/3-540-44499-8\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/NaccacheT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OkadaTIT00, author = {Souichi Okada and Naoya Torii and Kouichi Itoh and Masahiko Takenaka}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2\({}^{\mbox{m}}\)) on an {FPGA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {25--40}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_2}, doi = {10.1007/3-540-44499-8\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OkadaTIT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrlandoP00, author = {Gerardo Orlando and Christof Paar}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A High Performance Reconfigurable Elliptic Curve Processor for GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {41--56}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_3}, doi = {10.1007/3-540-44499-8\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrlandoP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Patterson00, author = {Cameron Patterson}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Dynamic {FPGA} Implementation of the Serpent Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {141--155}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_10}, doi = {10.1007/3-540-44499-8\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Patterson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PorninS00, author = {Thomas Pornin and Jacques Stern}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Software-Hardware Trade-Offs: Application to {A5/1} Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {318--327}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_25}, doi = {10.1007/3-540-44499-8\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PorninS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SavasTK00, author = {Erkay Savas and Alexandre F. Tenca and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Scalable and Unified Multiplier Architecture for Finite Fields GF(\emph{p}) and GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {277--292}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_22}, doi = {10.1007/3-540-44499-8\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SavasTK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Schindler00, author = {Werner Schindler}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Timing Attack against {RSA} with the Chinese Remainder Theorem}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {109--124}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_8}, doi = {10.1007/3-540-44499-8\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Schindler00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Shamir00, author = {Adi Shamir}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {71--77}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_5}, doi = {10.1007/3-540-44499-8\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Shamir00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TrimbergerPS00, author = {Steven Trimberger and Raymond Pang and Amit Singh}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A 12 Gbps {DES} Encryptor/Decryptor Core in an {FPGA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {156--163}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_11}, doi = {10.1007/3-540-44499-8\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TrimbergerPS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter00, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Data Integrity in Hardware for Modular Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {204--215}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_15}, doi = {10.1007/3-540-44499-8\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Weingart00, author = {Steve H. Weingart}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Physical Security Devices for Computer Subsystems: {A} Survey of Attacks and Defences}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {302--317}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_24}, doi = {10.1007/3-540-44499-8\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Weingart00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Wu00, author = {Huapeng Wu}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Montgomery Multiplier and Squarer in GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {264--276}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_21}, doi = {10.1007/3-540-44499-8\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Wu00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2000, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8}, doi = {10.1007/3-540-44499-8}, isbn = {3-540-41455-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.