Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of ches 2008
Preface and frontmatter
Page
Title
1-14
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform
15-29
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
30-44
Multiple-Differential Side-Channel Collision Attacks on AES
45-61
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?
62-78
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
79-99
Exploiting the Power of GPUs for Asymmetric Cryptography
100-112
High-Performance Concurrent Error Detection Scheme for AES Hardware
113-129
A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis
130-145
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks
146-163
A Design for a Physical RNG with Robust Entropy Estimators
164-180
Fast Digital TRNG Based on Metastable Ring Oscillator
181-197
Efficient Helper Data Key Extractor on FPGAs
198-213
The Carry Leakage on the Randomized Exponent Countermeasure
214-227
Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths
228-243
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES
244-265
Binary Edwards Curves
266-282
A Real-World Attack Breaking A5/1 within Hours
283-299
Hash Functions and RFID Tags: Mind the Gap
300-314
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
315-330
A Very Compact Hardware Implementation of the MISTY1 Block Cipher
331-345
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
346-362
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
363-379
RFID and Its Vulnerability to Faults
380-395
Perturbating RSA Public Keys: An Improved Attack
396-410
Divided Backend Duplication Methodology for Balanced Dual Rail Routing
411-425
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages
426-442
Mutual Information Analysis
443
RSA-Past, Present, Future
444
A Vision for Platform Security