default search action
5. CHES 2003: Cologne, Germany
- Colin D. Walter, Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2779, Springer 2003, ISBN 3-540-40833-9
Invited Talk
- Frank Stajano:
The Security Challenges of Ubiquitous Computing. 1
Side Channel Attack Methodology
- Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi:
Multi-channel Attacks. 2-16 - Chris Karlof, David A. Wagner:
Hidden Markov Model Cryptanalysis. 17-34 - Siddika Berna Örs, Elisabeth Oswald, Bart Preneel:
Power-Analysis Attacks on an FPGA - First Experimental Results. 35-50
Hardware Factorization
- Willi Geiselmann, Rainer Steinwandt:
Hardware to Solve Sparse Systems of Linear Equations over GF(2). 51-61
Symmetric Ciphers: Side Channel Attacks and Countermeasures
- Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi:
Cryptanalysis of DES Implemented on Computers with Cache. 62-76 - Gilles Piret, Jean-Jacques Quisquater:
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. 77-88 - Jean-Sébastien Coron, Alexei Tchulkine:
A New Algorithm for Switching from Arithmetic to Boolean Masking. 89-97 - Jovan Dj. Golic:
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. 98-112
Secure Hardware Logic
- Ramesh Karri, Grigori Kuznetsov, Michael Gössel:
Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. 113-124 - Kris Tiri, Ingrid Verbauwhede:
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. 125-136 - Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor:
Security Evaluation of Asynchronous Circuits. 137-151
Random Number Generators
- Michael Epstein, Laszlo Hars, Raymond Krasinski, Martin Rosner, Hao Zheng:
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts. 152-165 - Boaz Barak, Ronen Shaltiel, Eran Tromer:
True Random Number Generators Secure in a Changing Environment. 166-180 - Markus Dichtl:
How to Predict the Output of a Hardware Random Number Generator. 181-188
Efficient Multiplication
- Arash Reyhani-Masoleh, M. Anwarul Hasan:
On Low Complexity Bit Parallel Polynomial Basis Multipliers. 189-202 - Jean-François Dhem:
Efficient Modular Reduction Algorithm in IFq[x] and Its Application to "Left to Right" Modular Multiplication in IF2[x]. 203-213 - Benoît Chevallier-Mames, Marc Joye, Pascal Paillier:
Faster Double-Size Modular Multiplication from Euclidean Multipliers. 214-227
More on Efficient Artihmetic
- Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong:
Efficient Exponentiation for a Class of Finite Fields GF(2 n) Determined by Gauss Periods. 228-242 - Marc Joye, Pascal Paillier:
GCD-Free Algorithms for Computing Modular Inverses. 243-253
Attacks on Asymmetric Cryptosystems
- Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard:
Attacking Unbalanced RSA-CRT Using SPA. 254-268 - Pierre-Alain Fouque, Frédéric Valette:
The Doubling Attack - Why Upwards Is Better than Downwards. 269-280 - Nigel P. Smart:
An Analysis of Goubin's Refined Power Analysis Attack. 281-290 - Julien Cathalo, François Koeune, Jean-Jacques Quisquater:
A New Type of Timing Attack: Application to GPS. 291-303
Implementation of Symmetric Ciphers
- Akashi Satoh, Sumio Morioka:
Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia. 304-318 - Pawel Chodowiec, Kris Gaj:
Very Compact FPGA Implementation of the AES Algorithm. 319-333 - François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. 334-350
Hyperelliptic Curve Cryptography
- Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Christof Paar:
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. 351-365 - Roberto Maria Avanzi:
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. 366-381
Countermeasures to Side Channel Leakage
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka:
A Practical Countermeasure against Address-Bit Differential Power Analysis. 382-396 - Katsuyuki Okeya, Tsuyoshi Takagi:
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. 397-410
Security of Standards
- Jolyon Clulow:
On the Security of PKCS#11. 411-425 - Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa:
Attacking RSA-Based Sessions in SSL/TLS. 426-440
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.