


default search action
3. CHES 2001: Paris, France
- Çetin Kaya Koç, David Naccache, Christof Paar:

Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings. Lecture Notes in Computer Science 2162, Springer 2001, ISBN 3-540-42521-7
Invited Talk
- Ross J. Anderson:

Protecting Embedded Systems - The Next Ten Years. 1-2
Side Channel Attacks I
- Louis Goubin:

A Sound Method for Switching between Boolean and Arithmetic Masking. 3-15 - Eric Brier, Helena Handschuh, Christophe Tymen:

Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. 16-27 - David May, Henk L. Muller, Nigel P. Smart:

Random Register Renaming to Foil DPA. 28-38 - Elisabeth Oswald

, Manfred Josef Aigner:
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. 39-50
Rijndael Hardware Implementation
- Henry Kuo, Ingrid Verbauwhede

:
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm. 51-64 - Máire McLoone, John V. McCanny:

High Performance Single-Chip FPGA Rijndael Algorithm Implementations. 65-76 - Viktor Fischer, Milos Drutarovský

:
Two Methods of Rijndael Implementation in Reconfigurable Hardware. 77-92
Random Number Generators
- Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro:

Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. 93-102 - Werner Schindler:

Efficient Online Tests for True Random Number Generators. 103-117
Elliptic Curve Algorithms
- Nigel P. Smart:

The Hessian Form of an Elliptic Curve. 118-125 - Katsuyuki Okeya, Kouichi Sakurai:

Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. 126-141 - Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç:

Generating Elliptic Curves of Prime Order. 142-158
Invited Talk
- Adi Shamir:

New Directions in Croptography. 159
Arithmetic Architectures
- Manuel Leone

:
A New Low Complexity Parallel Multiplier for a Class of Finite Fields. 160-170 - Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi:

Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. 171-184 - Alexandre F. Tenca, Georgi Todorov, Çetin Kaya Koç:

High-Radix Design of a Scalable Modular Multiplier. 185-201 - Johann Großschädl:

A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). 202-219
Cryptanalysis
- Mike Bond:

Attacks on Cryptoprocessor Transaction Sets. 220-234 - Adam L. Young, Moti Yung:

Bandwidth-Optimal Kleptographic Attacks. 235-250 - Karine Gandolfi, Christophe Mourtel, Francis Olivier:

Electromagnetic Analysis: Concrete Results. 251-261
Embedded Implementations and New Ciphers
- Daniel V. Bailey, Daniel Coffin, Adam J. Elbirt, Joseph H. Silverman, Adam D. Woodbury:

NTRU in Constrained Devices. 262-272 - Thomas Pornin:

Transparent Harddisk Encryption. 273-285
Side Channel Attacks II
- Colin D. Walter:

Sliding Windows Succumbs to Big Mac Attack. 286-299 - Christophe Clavier, Marc Joye:

Universal Exponentiation Algorithm. 300-308 - Mehdi-Laurent Akkar, Christophe Giraud

:
An Implementation of DES and AES, Secure against Some Attacks. 309-318
Hardware Implementation of Ciphers
- Palash Sarkar, Subhamoy Maitra:

Efficient Implementation of "Large" Stream Cipher Systems. 319-332 - Ocean Y. H. Cheung, Kuen Hung Tsoi, Philip Heng Wai Leong

, Monk-Ping Leong:
Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA. 333-347 - Gerardo Orlando, Christof Paar:

A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware. 348-363 - Hanae Nozaki

, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura
:
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. 364-376
Side Channel Attacks on Elliptic Curve Cryptanalysis
- Marc Joye, Christophe Tymen:

Protections against Differential Analysis for Elliptic Curve Cryptography. 377-390 - Pierre-Yvan Liardet, Nigel P. Smart:

Preventing SPA/DPA in ECC Systems Using the Jacobi Form. 391-401 - Marc Joye, Jean-Jacques Quisquater:

Hessian Elliptic Curves and Side-Channel Attacks. 402-410

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














