Invited Talk |
|
|
|
1 | (1) |
|
|
|
|
Cryptanalytic Hardware |
|
|
Factoring large numbers with the TWINKLE device |
|
|
2 | (11) |
|
|
|
|
|
DES cracking on the Transmogrifier 2a |
|
|
13 | (12) |
|
|
|
|
|
|
|
|
Hardware Architectures |
|
|
Modeling the crypto-processor from design to synthesis |
|
|
25 | (12) |
|
|
|
|
|
|
|
|
|
A DES ASIC suitable for network encryption at 10 Gbps and beyond |
|
|
37 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Hardware design and performance estimation of the 128-bit block cipher CRYPTON |
|
|
49 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
Smartcards and Embedded Systems |
|
|
Fast implementation of public-key cryptography on a DSP TMS320C6201 |
|
|
61 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
How to implement cost-effective and secure public key cryptosystems |
|
|
73 | (7) |
|
|
|
|
|
|
|
|
|
|
|
|
Invited Talk |
|
|
Montgomery's multiplication technique: How to make it smaller and faster |
|
|
80 | (14) |
|
|
|
|
Arithmetic Algorithms I |
|
|
A scalable architecture for Montgomery multiplication |
|
|
94 | (15) |
|
|
|
|
|
|
|
|
|
Arithmetic design for permutation groups |
|
|
109 | (13) |
|
|
|
|
|
Fast multiplication in finite fields GF(2N) |
|
|
122 | (13) |
|
|
|
|
|
Efficient finite field basis conversion involving dual bases |
|
|
135 | (9) |
|
|
|
|
|
|
|
|
Power Attacks I |
|
|
Power analysis attacks of modular exponentiation in smartcards |
|
|
144 | (14) |
|
|
|
|
|
|
|
|
|
|
|
|
|
DES and differential power analysis |
|
|
158 | (15) |
|
|
|
|
|
|
|
|
|
IPA: A new class of power attacks |
|
|
173 | (14) |
|
|
|
|
|
|
|
|
Invited Talk |
|
|
Security evaluation schemas for the public and private market with a focus on smart card systems |
|
|
187 | (17) |
|
|
|
|
True Random Number Generators |
|
|
A design of reliable true random number generator for cryptographic applications |
|
|
204 | (15) |
|
|
|
|
|
|
|
|
|
Random number generators founded on signal and information theory |
|
|
219 | (12) |
|
|
|
|
|
|
|
|
Cryptographic Algorithms on FPGAs |
|
|
A high-performance flexible architecture for cryptography |
|
|
231 | (15) |
|
|
|
|
|
|
|
|
|
CryptoBooster: A reconfigurable and modular cryptographic coprocessor |
|
|
246 | (11) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Elliptic curve scalar multiplier design using FPGAs |
|
|
257 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
Arithmetic Algorithms II |
|
|
Highly regular architectures for finite field computation using redundant basis |
|
|
269 | (11) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Low complexity bit-parallel finite field arithmetic using polynomial basis |
|
|
280 | (12) |
|
|
|
|
Power Attacks II |
|
|
Resistance against differential power analysis for elliptic curve cryptosystems |
|
|
292 | (11) |
|
|
|
|
|
Probing attacks on tamper-resistant devices |
|
|
303 | (13) |
|
|
|
|
|
|
|
|
|
|
|
|
Elliptic Curve Implementations |
|
|
Fast multiplication on elliptic curves over GF(2m) without precomputation |
|
|
316 | (12) |
|
|
|
|
|
|
|
|
New Cryptographic Schemes and Modes of Operation |
|
|
NICE --- New Ideal Coset Encryption |
|
|
328 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Encryption with statistical self-synchronization in synchronous broadband networks |
|
|
340 | (13) |
|
|
|
|
|
|
|
|
Author Index |
|
353 | |