Search dblp for Publications

export results for "toc:db/conf/ches/ches2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ches/AgrawalRRS05,
  author       = {Dakshi Agrawal and
                  Josyula R. Rao and
                  Pankaj Rohatgi and
                  Kai Schramm},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Templates as Master Keys},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_2},
  doi          = {10.1007/11545262\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AgrawalRRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BatinaHHPV05,
  author       = {Lejla Batina and
                  David Hwang and
                  Alireza Hodjat and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)}
                  on the 8051{\(\mathrm{\mu}\)}P},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_8},
  doi          = {10.1007/11545262\_8},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BucciL05,
  author       = {Marco Bucci and
                  Raimondo Luzzi},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Design of Testable Random Bit Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {147--156},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_11},
  doi          = {10.1007/11545262\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BucciL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Canright05,
  author       = {David Canright},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A Very Compact S-Box for {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {441--455},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_32},
  doi          = {10.1007/11545262\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Canright05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronLP05,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Lefranc and
                  Guillaume Poupard},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_4},
  doi          = {10.1007/11545262\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DupuyK05,
  author       = {William Dupuy and
                  S{\'{e}}bastien Kunz{-}Jacques},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Resistance of Randomized Projective Coordinates Against Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_1},
  doi          = {10.1007/11545262\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DupuyK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FischerG05,
  author       = {Wieland Fischer and
                  Berndt M. Gammel},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Masking at Gate Level in the Presence of Glitches},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_14},
  doi          = {10.1007/11545262\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FischerG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FrankeKPPPS05,
  author       = {Jens Franke and
                  Thorsten Kleinjung and
                  Christof Paar and
                  Jan Pelzl and
                  Christine Priplata and
                  Colin Stahlke},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{SHARK:} {A} Realizable Special Hardware Sieving Device for Factoring
                  1024-Bit Integers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_9},
  doi          = {10.1007/11545262\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FrankeKPPPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GebotysHT05,
  author       = {Catherine H. Gebotys and
                  Simon Ho and
                  C. C. Tiu},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{EM} Analysis of Rijndael and {ECC} on a Wireless Java-Based {PDA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {250--264},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_19},
  doi          = {10.1007/11545262\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GebotysHT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GeiselmannSST05,
  author       = {Willi Geiselmann and
                  Adi Shamir and
                  Rainer Steinwandt and
                  Eran Tromer},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Scalable Hardware for Sparse Systems of Linear Equations, with Applications
                  to Integer Factorization},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {131--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_10},
  doi          = {10.1007/11545262\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GeiselmannSST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoodB05,
  author       = {Tim Good and
                  Mohammed Benaissa},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{AES} on {FPGA} from the Fastest to the Smallest},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {427--440},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_31},
  doi          = {10.1007/11545262\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoodB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrabherP05,
  author       = {Philipp Grabher and
                  Dan Page},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Hardware Acceleration of the Tate Pairing in Characteristic Three},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_29},
  doi          = {10.1007/11545262\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrabherP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GreenNS05,
  author       = {P. J. Green and
                  Richard Noad and
                  Nigel P. Smart},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Further Hidden Markov Model Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_5},
  doi          = {10.1007/11545262\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GreenNS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossschadlAST05,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Roberto Maria Avanzi and
                  Erkay Savas and
                  Stefan Tillich},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Energy-Efficient Software Implementation of Long Integer Modular Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_6},
  doi          = {10.1007/11545262\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossschadlAST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuilleyHMP05,
  author       = {Sylvain Guilley and
                  Philippe Hoogvorst and
                  Yves Mathieu and
                  Renaud Pacalet},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {The "Backend Duplication" Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {383--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_28},
  doi          = {10.1007/11545262\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuilleyHMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Hars05,
  author       = {Laszlo Hars},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Fast Truncated Multiplication for Cryptographic Applications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_16},
  doi          = {10.1007/11545262\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Hars05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePS05,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Berry Schoenmakers},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {On Second-Order Differential Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_22},
  doi          = {10.1007/11545262\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KaiharaT05,
  author       = {Marcelo E. Kaihara and
                  Naofumi Takagi},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Bipartite Modular Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {201--210},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_15},
  doi          = {10.1007/11545262\_15},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KaiharaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KerinsMPB05,
  author       = {Tim Kerins and
                  William P. Marnane and
                  Emanuel M. Popovici and
                  Paulo S. L. M. Barreto},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Efficient Hardware for the Tate Pairing Calculation in Characteristic
                  Three},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {412--426},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_30},
  doi          = {10.1007/11545262\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KerinsMPB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Kuhn05,
  author       = {Markus G. Kuhn},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Security Limits for Compromising Emanations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_20},
  doi          = {10.1007/11545262\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Kuhn05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KuhnKLSS05,
  author       = {Ulrich K{\"{u}}hn and
                  Klaus Kursawe and
                  Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Secure Data Management in Trusted Computing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_24},
  doi          = {10.1007/11545262\_24},
  timestamp    = {Mon, 05 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KuhnKLSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiMM05,
  author       = {Huiyun Li and
                  A. Theodore Markettos and
                  Simon W. Moore},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Security Evaluation Against Electromagnetic Analysis at Design Time},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {280--292},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_21},
  doi          = {10.1007/11545262\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MangardPO05,
  author       = {Stefan Mangard and
                  Norbert Pramstaller and
                  Elisabeth Oswald},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Successfully Attacking Masked {AES} Hardware Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_12},
  doi          = {10.1007/11545262\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MangardPO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OkeyaTV05,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Short Memory Scalar Multiplication on Koblitz Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_7},
  doi          = {10.1007/11545262\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OkeyaTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PeetersSDQ05,
  author       = {Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Donckers and
                  Jean{-}Jacques Quisquater},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_23},
  doi          = {10.1007/11545262\_23},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppM05,
  author       = {Thomas Popp and
                  Stefan Mangard},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing
                  Constraints},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_13},
  doi          = {10.1007/11545262\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoppM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchindlerLP05,
  author       = {Werner Schindler and
                  Kerstin Lemke and
                  Christof Paar},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A Stochastic Model for Differential Side Channel Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {30--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_3},
  doi          = {10.1007/11545262\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Seysen05,
  author       = {Martin Seysen},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Using an {RSA} Accelerator for Modular Inversion},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {226--236},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_17},
  doi          = {10.1007/11545262\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Seysen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Skorobogatov05,
  author       = {Sergei P. Skorobogatov},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Data Remanence in Flash Memory Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_25},
  doi          = {10.1007/11545262\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Skorobogatov05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SunarC05,
  author       = {Berk Sunar and
                  David Cyganski},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Comparison of Bit and Word Level Algorithms for Evaluating Unstructured
                  Functions over Finite Rings},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {237--249},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_18},
  doi          = {10.1007/11545262\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SunarC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SuzukiSI05,
  author       = {Daisuke Suzuki and
                  Minoru Saeki and
                  Tetsuya Ichikawa},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{DPA} Leakage Models for {CMOS} Logic Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {366--382},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_27},
  doi          = {10.1007/11545262\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SuzukiSI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TiriHHLYSV05,
  author       = {Kris Tiri and
                  David D. Hwang and
                  Alireza Hodjat and
                  Bo{-}Cheng Lai and
                  Shenglin Yang and
                  Patrick Schaumont and
                  Ingrid Verbauwhede},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Prototype {IC} with {WDDL} and Differential Routing - {DPA} Resistance
                  Assessment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {354--365},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_26},
  doi          = {10.1007/11545262\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TiriHHLYSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2005,
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262},
  doi          = {10.1007/11545262},
  isbn         = {3-540-28474-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics