Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
Publications of Ches 2001
Page
Title
1-2
Protecting Embedded Systems - The Next Ten Years
3-15
A Sound Method for Switching between Boolean and Arithmetic Masking
16-27
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware
28-38
Random Register Renaming to Foil DPA
39-50
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
51-64
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm
65-76
High Performance Single-Chip FPGA Rijndael Algorithm Implementations
77-92
Two Methods of Rijndael Implementation in Reconfigurable Hardware
93-102
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor
103-117
Efficient Online Tests for True Random Number Generators
118-125
The Hessian Form of an Elliptic Curve
126-141
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve
142-158
Generating Elliptic Curves of Prime Order
159
New Directions in Croptography
160-170
A New Low Complexity Parallel Multiplier for a Class of Finite Fields
171-184
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
185-201
High-Radix Design of a Scalable Modular Multiplier
202-219
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2
^{m}
)
220-234
Attacks on Cryptoprocessor Transaction Sets
235-250
Bandwidth-Optimal Kleptographic Attacks
251-261
Electromagnetic Analysis: Concrete Results
262-272
NTRU in Constrained Devices
273-285
Transparent Harddisk Encryption
286-299
Sliding Windows Succumbs to Big Mac Attack
300-308
Universal Exponentiation Algorithm
309-318
An Implementation of DES and AES, Secure against Some Attacks
319-332
Efficient Implementation of "Large" Stream Cipher Systems
333-347
Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA
348-363
A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware
364-376
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication
377-390
Protections against Differential Analysis for Elliptic Curve Cryptography
391-401
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
402-410
Hessian Elliptic Curves and Side-Channel Attacks