Abstract is missing.
- About Cryptographic EngineeringÇetin Kaya Koç. 1-4 [doi]
- Random Number Generators for Cryptographic ApplicationsWerner Schindler. 5-23 [doi]
- Evaluation Criteria for Physical Random Number GeneratorsWerner Schindler. 25-54 [doi]
- True Random Number Generators for CryptographyBerk Sunar. 55-73 [doi]
- Fast Finite Field MultiplicationSerdar Süer Erdem, Tugrul Yanik, Çetin Kaya Koç. 75-104 [doi]
- Efficient Unified Arithmetic for Hardware CryptographyErkay Savas, Çetin Kaya Koç. 105-124 [doi]
- Spectral Modular Arithmetic for CryptographyGökay Saldamli, Çetin Kaya Koç. 125-169 [doi]
- Elliptic and Hyperelliptic Curve CryptographyNigel Boston, Matthew Darnall. 171-189 [doi]
- Instruction Set Extensions for Cryptographic ApplicationsSandro Bartolini, Roberto Giorgi, Enrico Martinelli. 191-233 [doi]
- FPGA and ASIC Implementations of AESKris Gaj, Pawel Chodowiec. 235-294 [doi]
- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAsFrançois-Xavier Standaert. 295-320 [doi]
- Block Cipher Modes of Operation from a Hardware Implementation PerspectiveDebrup Chakraborty, Francisco Rodríguez-Henríquez. 321-363 [doi]
- Basics of Side-Channel AnalysisMarc Joye. 365-380 [doi]
- Improved Techniques for Side-Channel AnalysisPankaj Rohatgi. 381-406 [doi]
- Electromagnetic Attacks and CountermeasuresPankaj Rohatgi. 407-430 [doi]
- Leakage from Montgomery MultiplicationColin D. Walter. 431-449 [doi]
- Randomized Exponentiation AlgorithmsColin D. Walter. 451-473 [doi]
- Microarchitectural Attacks and CountermeasuresOnur Aciiçmez, Çetin Kaya Koç. 475-504 [doi]