Search dblp for Publications

export results for "toc:db/conf/ches/ches2000.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ches/ChungSL00,
  author       = {Jae Wook Chung and
                  Sang Gyoo Sim and
                  Pil Joong Lee},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Fast Implementation of Elliptic Curve Defined over GF(\emph{p}\({}^{\mbox{m}}\))
                  on CalmRISC with {MAC2424} Coprocessor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {57--70},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_4},
  doi          = {10.1007/3-540-44499-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChungSL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClavierCD00,
  author       = {Christophe Clavier and
                  Jean{-}S{\'{e}}bastien Coron and
                  Nora Dabbous},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Differential Power Analysis in the Presence of Hardware Countermeasures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {252--263},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_20},
  doi          = {10.1007/3-540-44499-8\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ClavierCD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronG00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Louis Goubin},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {On Boolean and Arithmetic Masking against Differential Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {231--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_18},
  doi          = {10.1007/3-540-44499-8\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DandalisPR00,
  author       = {Andreas Dandalis and
                  Viktor K. Prasanna and
                  Jos{\'{e}} D. P. Rolim},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Comparative Study of Performance of {AES} Final Candidates Using
                  FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_9},
  doi          = {10.1007/3-540-44499-8\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DandalisPR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoodmanC00,
  author       = {James Goodman and
                  Anantha P. Chandrakasan},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor
                  Architecture},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_13},
  doi          = {10.1007/3-540-44499-8\_13},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoodmanC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Grossschadl00,
  author       = {Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {High-Speed {RSA} Hardware Based on Barret's Modular Reduction Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {191--203},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_14},
  doi          = {10.1007/3-540-44499-8\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Grossschadl00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HachezQ00,
  author       = {Ga{\"{e}}l Hachez and
                  Jean{-}Jacques Quisquater},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Montgomery Exponentiation with no Final Subtractions: Improved Results},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {293--301},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_23},
  doi          = {10.1007/3-540-44499-8\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HachezQ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HankersonHM00,
  author       = {Darrel Hankerson and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Alfred Menezes},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Software Implementation of Elliptic Curve Cryptography over Binary
                  Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_1},
  doi          = {10.1007/3-540-44499-8\_1},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HankersonHM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Hasan00,
  author       = {M. Anwarul Hasan},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Power Analysis Attacks and Algorithmic Approaches to their Countermeasures
                  for Koblitz Curve Cryptosystems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {93--108},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_7},
  doi          = {10.1007/3-540-44499-8\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Hasan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HoffsteinS00,
  author       = {Jeffrey Hoffstein and
                  Joseph H. Silverman},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {MiniPASS: Authentication and Digital Signatures in a Constrained Environment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {328--339},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_26},
  doi          = {10.1007/3-540-44499-8\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HoffsteinS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePV00,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Serge Vaudenay},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Generation of Prime Numbers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_27},
  doi          = {10.1007/3-540-44499-8\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KatoIAM00,
  author       = {Takehiko Kato and
                  Satoru Ito and
                  Jun Anzai and
                  Natsume Matsuzaki},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication
                  Terminals},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {216--228},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_16},
  doi          = {10.1007/3-540-44499-8\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KatoIAM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeitoldMPPPW00,
  author       = {Herbert Leitold and
                  Wolfgang Mayerwieser and
                  Udo Payer and
                  Karl C. Posch and
                  Reinhard Posch and
                  Johannes Wolkerstorfer},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A 155 Mbps Triple-DES Network Encryptor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {164--174},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_12},
  doi          = {10.1007/3-540-44499-8\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LeitoldMPPPW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Mayer-Sommer00,
  author       = {Rita Mayer{-}Sommer},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Smartly Analyzing the Simplicity and the Power of Simple Power Analysis
                  on Smartcards},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {78--92},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_6},
  doi          = {10.1007/3-540-44499-8\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Mayer-Sommer00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Messerges00,
  author       = {Thomas S. Messerges},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Using Second-Order Power Analysis to Attack {DPA} Resistant Software},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {238--251},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_19},
  doi          = {10.1007/3-540-44499-8\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Messerges00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/NaccacheT00,
  author       = {David Naccache and
                  Michael Tunstall},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {How to Explain Side-Channel Leakage to Your Kids},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {229--230},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_17},
  doi          = {10.1007/3-540-44499-8\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/NaccacheT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OkadaTIT00,
  author       = {Souichi Okada and
                  Naoya Torii and
                  Kouichi Itoh and
                  Masahiko Takenaka},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2\({}^{\mbox{m}}\))
                  on an {FPGA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {25--40},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_2},
  doi          = {10.1007/3-540-44499-8\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OkadaTIT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrlandoP00,
  author       = {Gerardo Orlando and
                  Christof Paar},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A High Performance Reconfigurable Elliptic Curve Processor for GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {41--56},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_3},
  doi          = {10.1007/3-540-44499-8\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrlandoP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Patterson00,
  author       = {Cameron Patterson},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Dynamic {FPGA} Implementation of the Serpent Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_10},
  doi          = {10.1007/3-540-44499-8\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Patterson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PorninS00,
  author       = {Thomas Pornin and
                  Jacques Stern},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Software-Hardware Trade-Offs: Application to {A5/1} Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {318--327},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_25},
  doi          = {10.1007/3-540-44499-8\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PorninS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavasTK00,
  author       = {Erkay Savas and
                  Alexandre F. Tenca and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Scalable and Unified Multiplier Architecture for Finite Fields GF(\emph{p})
                  and GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_22},
  doi          = {10.1007/3-540-44499-8\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SavasTK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Schindler00,
  author       = {Werner Schindler},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Timing Attack against {RSA} with the Chinese Remainder Theorem},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_8},
  doi          = {10.1007/3-540-44499-8\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Schindler00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Shamir00,
  author       = {Adi Shamir},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Protecting Smart Cards from Passive Power Analysis with Detached Power
                  Supplies},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {71--77},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_5},
  doi          = {10.1007/3-540-44499-8\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Shamir00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TrimbergerPS00,
  author       = {Steven Trimberger and
                  Raymond Pang and
                  Amit Singh},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A 12 Gbps {DES} Encryptor/Decryptor Core in an {FPGA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {156--163},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_11},
  doi          = {10.1007/3-540-44499-8\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TrimbergerPS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter00,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Data Integrity in Hardware for Modular Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {204--215},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_15},
  doi          = {10.1007/3-540-44499-8\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Weingart00,
  author       = {Steve H. Weingart},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Physical Security Devices for Computer Subsystems: {A} Survey of Attacks
                  and Defences},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {302--317},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_24},
  doi          = {10.1007/3-540-44499-8\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Weingart00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Wu00,
  author       = {Huapeng Wu},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Montgomery Multiplier and Squarer in GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {264--276},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_21},
  doi          = {10.1007/3-540-44499-8\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Wu00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2000,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8},
  doi          = {10.1007/3-540-44499-8},
  isbn         = {3-540-41455-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics