default search action
6. CHES 2004: Cambridge, MA, USA
- Marc Joye, Jean-Jacques Quisquater:
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Lecture Notes in Computer Science 3156, Springer 2004, ISBN 3-540-22666-4
Side Channels I
- Jason Waddle, David A. Wagner:
Towards Efficient Second-Order Power Analysis. 1-15 - Eric Brier, Christophe Clavier, Francis Olivier:
Correlation Power Analysis with a Leakage Model. 16-29 - François-Xavier Standaert, Siddika Berna Örs, Bart Preneel:
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? 30-44
Modular Multiplication
- Laszlo Hars:
Long Modular Multiplication for Cryptographic Applications. 45-61 - Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia:
Leak Resistant Arithmetic. 62-75 - Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong:
Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. 76-91
Low Resources I
- Erdinç Öztürk, Berk Sunar, Erkay Savas:
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. 92-106 - Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer:
A Low-Cost ECC Coprocessor for Smartcards. 107-118 - Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz:
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. 119-132
Implementation Aspects
- Johann Großschädl, Erkay Savas:
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2m). 133-147 - Roberto Maria Avanzi:
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. 148-162
Collisison Attacks
- Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar:
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. 163-175 - Hervé Ledig, Frédéric Muller, Frédéric Valette:
Enhancing Collision Attacks. 176-190
Side Channels II
- Colin D. Walter:
Simple Power Analysis of Unified Code for ECC Double and Add. 191-204 - Kerstin Lemke, Kai Schramm, Christof Paar:
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. 205-219 - Loren D. Olson:
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. 220-229 - Olaf Neiße, Jürgen Pulkus:
Switching Blindings with a View Towards IDEA. 230-239
Falt Attacks
- Jonathan J. Hoch, Adi Shamir:
Fault Analysis of Stream Ciphers. 240-253 - Ludger Hemme:
A Differential Fault Attack Against Early Rounds of (Triple-)DES. 254-267
Hardware Implementation I
- Holger Bock, Marco Bucci, Raimondo Luzzi:
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications. 268-281 - Danil Sokolov, Julian P. Murphy, Alexandre V. Bystrov, Alexandre Yakovlev:
Improving the Security of Dual-Rail Circuits. 282-297
Side Channels III
- Yasuyuki Sakai, Kouichi Sakurai:
A New Attack with Side Channel Leakage During Exponent Recoding Computations. 298-311 - Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette:
Defeating Countermeasures Based on Randomized BSD Representations. 312-327 - Pradeep Kumar Mishra:
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. 328-342 - Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto:
Efficient Countermeasures against RPA, DPA, and SPA. 343-356
Low Resources II
- Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer:
Strong Authentication for RFID Systems Using the AES Algorithm. 357-370 - Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen:
TTS: High-Speed Signatures on a Low-Cost Smart Card. 371-385
Hardware Implementation II
- Eric Peeters, Michael Neve, Mathieu Ciet:
XTR Implementation on Reconfigurable Hardware. 386-399 - Nikhil Joshi, Kaijie Wu, Ramesh Karri:
Concurrent Error Detection Schemes for Involution Ciphers. 400-412
Authentication and Signatures
- Marc Girault, David Lefranc:
Public Key Authentication with One (Online) Single Addition. 413-427 - Peter James Leadbitter, Dan Page, Nigel P. Smart:
Attacking DSA Under a Repeated Bits Assumption. 428-440 - Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval:
How to Disembed a Program? 441-454
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.