default search action
1. CHES 1999: Worcester, MA, USA
- Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings. Lecture Notes in Computer Science 1717, Springer 1999, ISBN 3-540-66646-X
Invited Talk
- Brian D. Snow:
We Need Assurance. 1
Cryptanalytic Hardware
- Adi Shamir:
Factoring Large Numbers with the Twinkle Device (Extended Abstract). 2-12 - Ivan Hamer, Paul Chow:
DES Cracking on the Transmogrifier 2a. 13-24
Hardware Architectures
- W. P. Choi, Lee-Ming Cheng:
Modelling the Crypto-Processor from Design to Synthesis. 25-36 - D. Craig Wilcox, Lyndon G. Pierson, Perry J. Robertson, Edward L. Witzke, Karl Gass:
A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond. 37-48 - Eunjong Hong, Jai-Hoon Chung, Chae Hoon Lim:
Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton. 49-60
Smartcards and Embedded Systems
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara:
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. 61-72 - Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim:
How to Implement Cost-Effective and Secure Public Key Cryptosystems. 73-79
Invited Talk
- Colin D. Walter:
Montgomery's Multiplication Technique: How to Make It Smaller and Faster. 80-93
Arithmetic Algorithms I
- Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable Architecture for Montgomery Multiplication. 94-108 - Tamás Horváth:
Arithmetic Design for Permutation Groups. 109-121 - Joseph H. Silverman:
Fast Multiplication in Finite Fields GF(2N). 122-134 - Burton S. Kaliski Jr., Moses D. Liskov:
Efficient Finite Field Basis Conversion Involving Dual Bases. 135-143
Power Attacks I
- Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan:
Power Analysis Attacks of Modular Exponentiation in Smartcards. 144-157 - Louis Goubin, Jacques Patarin:
DES and Differential Power Analysis (The "Duplication" Method). 158-172 - Paul N. Fahn, Peter K. Pearson:
IPA: A New Class of Power Attacks. 173-186
Invited Talk
- Eberhard von Faber:
Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems. 187-203
True Random Number Generators
- Vittorio Bagini, Marco Bucci:
A Design of Reliable True Random Number Generator for Cryptographic Applications. 204-218 - David Paul Maher, Robert J. Rance:
Random Number Generators Founded on Signal and Information Theory. 219-230
Cryptographic Algorithms on FPGAs
- R. Reed Taylor, Seth Copen Goldstein:
A High-Performance Flexible Architecture for Cryptography. 231-245 - Emeka Mosanya, Christof Teuscher, Héctor Fabio Restrepo, Patrick Galley, Eduardo Sanchez:
CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor. 246-256 - Lijun Gao, Sarvesh Shrivastava, Gerald E. Sobelman:
Elliptic Curve Scalar Multiplier Design Using FPGAs. 257-268
Arithmetic Algorithms II
- Huapeng Wu, M. Anwarul Hasan, Ian F. Blake:
Highly Regular Architectures for Finite Field Computation Using Redundant Basis. 269-279 - Huapeng Wu:
Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis. 280-291
Power Attacks II
- Jean-Sébastien Coron:
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. 292-302 - Helena Handschuh, Pascal Paillier, Jacques Stern:
Probing Attacks on Tamper-Resistant Devices. 303-315
Elliptic Curve Implementations
- Julio López, Ricardo Dahab:
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation. 316-327
New Cryptographic Schemes and Modes of Operation
- Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi:
NICE - New Ideal Coset Encryption. 328-339 - Oliver Jung, Christoph Ruland:
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. 340-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.