Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2000
- Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee:
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor. CHES 2000: 57-70 - Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous:
Differential Power Analysis in the Presence of Hardware Countermeasures. CHES 2000: 252-263 - Jean-Sébastien Coron, Louis Goubin:
On Boolean and Arithmetic Masking against Differential Power Analysis. CHES 2000: 231-237 - Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim:
A Comparative Study of Performance of AES Final Candidates Using FPGAs. CHES 2000: 125-140 - James Goodman, Anantha P. Chandrakasan:
An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture. CHES 2000: 175-190 - Johann Großschädl:
High-Speed RSA Hardware Based on Barret's Modular Reduction Method. CHES 2000: 191-203 - Gaël Hachez, Jean-Jacques Quisquater:
Montgomery Exponentiation with no Final Subtractions: Improved Results. CHES 2000: 293-301 - Darrel Hankerson, Julio César López-Hernández, Alfred Menezes:
Software Implementation of Elliptic Curve Cryptography over Binary Fields. CHES 2000: 1-24 - M. Anwarul Hasan:
Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems. CHES 2000: 93-108 - Jeffrey Hoffstein, Joseph H. Silverman:
MiniPASS: Authentication and Digital Signatures in a Constrained Environment. CHES 2000: 328-339 - Marc Joye, Pascal Paillier, Serge Vaudenay:
Efficient Generation of Prime Numbers. CHES 2000: 340-354 - Takehiko Kato, Satoru Ito, Jun Anzai, Natsume Matsuzaki:
A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals. CHES 2000: 216-228 - Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer:
A 155 Mbps Triple-DES Network Encryptor. CHES 2000: 164-174 - Rita Mayer-Sommer:
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. CHES 2000: 78-92 - Thomas S. Messerges:
Using Second-Order Power Analysis to Attack DPA Resistant Software. CHES 2000: 238-251 - David Naccache, Michael Tunstall:
How to Explain Side-Channel Leakage to Your Kids. CHES 2000: 229-230 - Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka:
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. CHES 2000: 25-40 - Gerardo Orlando, Christof Paar:
A High Performance Reconfigurable Elliptic Curve Processor for GF(2m). CHES 2000: 41-56 - Cameron Patterson:
A Dynamic FPGA Implementation of the Serpent Block Cipher. CHES 2000: 141-155 - Thomas Pornin, Jacques Stern:
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. CHES 2000: 318-327 - Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). CHES 2000: 277-292 - Werner Schindler:
A Timing Attack against RSA with the Chinese Remainder Theorem. CHES 2000: 109-124 - Adi Shamir:
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. CHES 2000: 71-77 - Steven Trimberger, Raymond Pang, Amit Singh:
A 12 Gbps DES Encryptor/Decryptor Core in an FPGA. CHES 2000: 156-163 - Colin D. Walter:
Data Integrity in Hardware for Modular Arithmetic. CHES 2000: 204-215 - Steve H. Weingart:
Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences. CHES 2000: 302-317 - Huapeng Wu:
Montgomery Multiplier and Squarer in GF(2m). CHES 2000: 264-276 - Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. Lecture Notes in Computer Science 1965, Springer 2000, ISBN 3-540-41455-X [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 17:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint