Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of ches 2003
Page
Title
1
The Security Challenges of Ubiquitous Computing
2-16
Multi-channel Attacks
17-34
Hidden Markov Model Cryptoanalysis
35-50
Power-Analysis Attacks on an FPGA - First Experimental Results
51-61
Hardware to Solve Sparse Systems of Linear Equations over GF(2)
62-76
Cryptanalysis of DES Implemented on Computers with Cache
77-88
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD
89-97
A New Algorithm for Switching from Arithmetic to Boolean Masking
98-112
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits
113-124
Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers
125-136
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology
137-151
Security Evaluation of Asynchronous Circuits
152-165
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts
166-180
True Random Number Generators Secure in a Changing Environment
181-188
How to Predict the Output of a Hardware Random Number Generator
189-202
On Low Complexity Bit Parallel Polynomial Basis Multipliers
203-213
Efficient Modular Reduction Algorithm in IF
_{q}
[x] and Its Application to "Left to Right" Modular Multiplication in IF
_{2}
[x]
214-227
Faster Double-Size Modular Multiplication from Euclidean Multipliers
228-242
Efficient Exponentiation for a Class of Finite Fields GF(2
^{n}
) Determined by Gauss Periods
243-253
GCD-Free Algorithms for Computing Modular Inverses
254-268
Attacking Unbalanced RSA-CRT Using SPA
269-280
The Doubling Attack -
Why Upwards Is Better than Downwards
281-290
An Analysis of Goubin's Refined Power Analysis Attack
291-303
A New Type of Timing Attack: Application to GPS
304-318
Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia
319-333
Very Compact FPGA Implementation of the AES Algorithm
334-350
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs
351-365
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
366-381
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems
382-396
A Practical Countermeasure against Address-Bit Differential Power Analysis
397-410
A More Flexible Countermeasure against Side Channel Attacks Using Window Method
411-425
On the Security of PKCS#11
426-440
Attacking RSA-Based Sessions in SSL/TLS