Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of ches 2004
Preface and frontmatter
Page
Title
1-15
Towards Efficient Second-Order Power Analysis
16-29
Correlation Power Analysis with a Leakage Model
30-44
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
45-61
Long Modular Multiplication for Cryptographic Applications
62-75
Leak Resistant Arithmetic
76-91
Efficient Linear Array for Multiplication in GF(2
^{m}
) Using a Normal Basis for Elliptic Curve Cryptography
92-106
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
107-118
A Low-Cost ECC Coprocessor for Smartcards
119-132
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
133-147
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2
^{m}
)
148-162
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
163-175
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack
176-190
Enhancing Collision Attacks
191-204
Simple Power Analysis of Unified Code for ECC Double and Add
205-219
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
220-229
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
230-239
Switching Blindings with a View Towards IDEA
240-253
Fault Analysis of Stream Ciphers
254-267
A Differential Fault Attack Against Early Rounds of (Triple-)DES
268-281
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications
282-297
Improving the Security of Dual-Rail Circuits
298-311
A New Attack with Side Channel Leakage During Exponent Recoding Computations
312-327
Defeating Countermeasures Based on Randomized BSD Representations
328-342
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
343-356
Efficient Countermeasures against RPA, DPA, and SPA
357-370
Strong Authentication for RFID Systems Using the AES Algorithm
371-385
TTS: High-Speed Signatures on a Low-Cost Smart Card
386-399
XTR Implementation on Reconfigurable Hardware
400-412
Concurrent Error Detection Schemes for Involution Ciphers
413-427
Public Key Authentication with One (Online) Single Addition
428-440
Attacking DSA Under a Repeated Bits Assumption
441-454
How to Disembed a Program?