Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ches/ches2005.bht:"
@inproceedings{DBLP:conf/ches/AgrawalRRS05, author = {Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi and Kai Schramm}, editor = {Josyula R. Rao and Berk Sunar}, title = {Templates as Master Keys}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {15--29}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_2}, doi = {10.1007/11545262\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AgrawalRRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BatinaHHPV05, author = {Lejla Batina and David Hwang and Alireza Hodjat and Bart Preneel and Ingrid Verbauwhede}, editor = {Josyula R. Rao and Berk Sunar}, title = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)} on the 8051{\(\mathrm{\mu}\)}P}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {106--118}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_8}, doi = {10.1007/11545262\_8}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BucciL05, author = {Marco Bucci and Raimondo Luzzi}, editor = {Josyula R. Rao and Berk Sunar}, title = {Design of Testable Random Bit Generators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {147--156}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_11}, doi = {10.1007/11545262\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BucciL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Canright05, author = {David Canright}, editor = {Josyula R. Rao and Berk Sunar}, title = {A Very Compact S-Box for {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {441--455}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_32}, doi = {10.1007/11545262\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Canright05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronLP05, author = {Jean{-}S{\'{e}}bastien Coron and David Lefranc and Guillaume Poupard}, editor = {Josyula R. Rao and Berk Sunar}, title = {A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {47--60}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_4}, doi = {10.1007/11545262\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DupuyK05, author = {William Dupuy and S{\'{e}}bastien Kunz{-}Jacques}, editor = {Josyula R. Rao and Berk Sunar}, title = {Resistance of Randomized Projective Coordinates Against Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {1--14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_1}, doi = {10.1007/11545262\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DupuyK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FischerG05, author = {Wieland Fischer and Berndt M. Gammel}, editor = {Josyula R. Rao and Berk Sunar}, title = {Masking at Gate Level in the Presence of Glitches}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {187--200}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_14}, doi = {10.1007/11545262\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FischerG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FrankeKPPPS05, author = {Jens Franke and Thorsten Kleinjung and Christof Paar and Jan Pelzl and Christine Priplata and Colin Stahlke}, editor = {Josyula R. Rao and Berk Sunar}, title = {{SHARK:} {A} Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {119--130}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_9}, doi = {10.1007/11545262\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FrankeKPPPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GebotysHT05, author = {Catherine H. Gebotys and Simon Ho and C. C. Tiu}, editor = {Josyula R. Rao and Berk Sunar}, title = {{EM} Analysis of Rijndael and {ECC} on a Wireless Java-Based {PDA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {250--264}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_19}, doi = {10.1007/11545262\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GebotysHT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GeiselmannSST05, author = {Willi Geiselmann and Adi Shamir and Rainer Steinwandt and Eran Tromer}, editor = {Josyula R. Rao and Berk Sunar}, title = {Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {131--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_10}, doi = {10.1007/11545262\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GeiselmannSST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoodB05, author = {Tim Good and Mohammed Benaissa}, editor = {Josyula R. Rao and Berk Sunar}, title = {{AES} on {FPGA} from the Fastest to the Smallest}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {427--440}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_31}, doi = {10.1007/11545262\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoodB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrabherP05, author = {Philipp Grabher and Dan Page}, editor = {Josyula R. Rao and Berk Sunar}, title = {Hardware Acceleration of the Tate Pairing in Characteristic Three}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {398--411}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_29}, doi = {10.1007/11545262\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrabherP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GreenNS05, author = {P. J. Green and Richard Noad and Nigel P. Smart}, editor = {Josyula R. Rao and Berk Sunar}, title = {Further Hidden Markov Model Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {61--74}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_5}, doi = {10.1007/11545262\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GreenNS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossschadlAST05, author = {Johann Gro{\ss}sch{\"{a}}dl and Roberto Maria Avanzi and Erkay Savas and Stefan Tillich}, editor = {Josyula R. Rao and Berk Sunar}, title = {Energy-Efficient Software Implementation of Long Integer Modular Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {75--90}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_6}, doi = {10.1007/11545262\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossschadlAST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuilleyHMP05, author = {Sylvain Guilley and Philippe Hoogvorst and Yves Mathieu and Renaud Pacalet}, editor = {Josyula R. Rao and Berk Sunar}, title = {The "Backend Duplication" Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {383--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_28}, doi = {10.1007/11545262\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuilleyHMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Hars05, author = {Laszlo Hars}, editor = {Josyula R. Rao and Berk Sunar}, title = {Fast Truncated Multiplication for Cryptographic Applications}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {211--225}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_16}, doi = {10.1007/11545262\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Hars05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePS05, author = {Marc Joye and Pascal Paillier and Berry Schoenmakers}, editor = {Josyula R. Rao and Berk Sunar}, title = {On Second-Order Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {293--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_22}, doi = {10.1007/11545262\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KaiharaT05, author = {Marcelo E. Kaihara and Naofumi Takagi}, editor = {Josyula R. Rao and Berk Sunar}, title = {Bipartite Modular Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {201--210}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_15}, doi = {10.1007/11545262\_15}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KaiharaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KerinsMPB05, author = {Tim Kerins and William P. Marnane and Emanuel M. Popovici and Paulo S. L. M. Barreto}, editor = {Josyula R. Rao and Berk Sunar}, title = {Efficient Hardware for the Tate Pairing Calculation in Characteristic Three}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {412--426}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_30}, doi = {10.1007/11545262\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KerinsMPB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Kuhn05, author = {Markus G. Kuhn}, editor = {Josyula R. Rao and Berk Sunar}, title = {Security Limits for Compromising Emanations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {265--279}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_20}, doi = {10.1007/11545262\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Kuhn05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KuhnKLSS05, author = {Ulrich K{\"{u}}hn and Klaus Kursawe and Stefan Lucks and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble}, editor = {Josyula R. Rao and Berk Sunar}, title = {Secure Data Management in Trusted Computing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {324--338}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_24}, doi = {10.1007/11545262\_24}, timestamp = {Mon, 05 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KuhnKLSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiMM05, author = {Huiyun Li and A. Theodore Markettos and Simon W. Moore}, editor = {Josyula R. Rao and Berk Sunar}, title = {Security Evaluation Against Electromagnetic Analysis at Design Time}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {280--292}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_21}, doi = {10.1007/11545262\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MangardPO05, author = {Stefan Mangard and Norbert Pramstaller and Elisabeth Oswald}, editor = {Josyula R. Rao and Berk Sunar}, title = {Successfully Attacking Masked {AES} Hardware Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {157--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_12}, doi = {10.1007/11545262\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MangardPO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OkeyaTV05, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Josyula R. Rao and Berk Sunar}, title = {Short Memory Scalar Multiplication on Koblitz Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {91--105}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_7}, doi = {10.1007/11545262\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OkeyaTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PeetersSDQ05, author = {Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Donckers and Jean{-}Jacques Quisquater}, editor = {Josyula R. Rao and Berk Sunar}, title = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {309--323}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_23}, doi = {10.1007/11545262\_23}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoppM05, author = {Thomas Popp and Stefan Mangard}, editor = {Josyula R. Rao and Berk Sunar}, title = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {172--186}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_13}, doi = {10.1007/11545262\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoppM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchindlerLP05, author = {Werner Schindler and Kerstin Lemke and Christof Paar}, editor = {Josyula R. Rao and Berk Sunar}, title = {A Stochastic Model for Differential Side Channel Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {30--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_3}, doi = {10.1007/11545262\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Seysen05, author = {Martin Seysen}, editor = {Josyula R. Rao and Berk Sunar}, title = {Using an {RSA} Accelerator for Modular Inversion}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {226--236}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_17}, doi = {10.1007/11545262\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Seysen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Skorobogatov05, author = {Sergei P. Skorobogatov}, editor = {Josyula R. Rao and Berk Sunar}, title = {Data Remanence in Flash Memory Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {339--353}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_25}, doi = {10.1007/11545262\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Skorobogatov05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SunarC05, author = {Berk Sunar and David Cyganski}, editor = {Josyula R. Rao and Berk Sunar}, title = {Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {237--249}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_18}, doi = {10.1007/11545262\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SunarC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SuzukiSI05, author = {Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa}, editor = {Josyula R. Rao and Berk Sunar}, title = {{DPA} Leakage Models for {CMOS} Logic Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {366--382}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_27}, doi = {10.1007/11545262\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SuzukiSI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TiriHHLYSV05, author = {Kris Tiri and David D. Hwang and Alireza Hodjat and Bo{-}Cheng Lai and Shenglin Yang and Patrick Schaumont and Ingrid Verbauwhede}, editor = {Josyula R. Rao and Berk Sunar}, title = {Prototype {IC} with {WDDL} and Differential Routing - {DPA} Resistance Assessment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {354--365}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_26}, doi = {10.1007/11545262\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TiriHHLYSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2005, editor = {Josyula R. Rao and Berk Sunar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262}, doi = {10.1007/11545262}, isbn = {3-540-28474-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.