Abstract is missing.
- Towards Efficient Second-Order Power AnalysisJason Waddle, David Wagner. 1-15 [doi]
- Correlation Power Analysis with a Leakage ModelEric Brier, Christophe Clavier, Francis Olivier. 16-29 [doi]
- Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?François-Xavier Standaert, Siddika Berna Örs, Bart Preneel. 30-44 [doi]
- Long Modular Multiplication for Cryptographic ApplicationsLaszlo Hars. 45-61 [doi]
- Leak Resistant ArithmeticJean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia. 62-75 [doi]
- Efficient Linear Array for Multiplication in GF(2:::m:::) Using a Normal Basis for Elliptic Curve CryptographySoonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun-Pyo Hong. 76-91 [doi]
- Low-Power Elliptic Curve Cryptography Using Scaled Modular ArithmeticErdinç Öztürk, Berk Sunar, Erkay Savas. 92-106 [doi]
- A Low-Cost ECC Coprocessor for SmartcardsHarald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer. 107-118 [doi]
- Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUsNils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz. 119-132 [doi]
- Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2:::m:::)Johann Großschädl, Erkay Savas. 133-147 [doi]
- Aspects of Hyperelliptic Curves over Large Prime Fields in Software ImplementationsRoberto Maria Avanzi. 148-162 [doi]
- A Collision-Attack on AES: Combining Side Channel- and Differential-AttackKai Schramm, Gregor Leander, Patrick Felke, Christof Paar. 163-175 [doi]
- Enhancing Collision AttacksHervé Ledig, Frédéric Muller, Frédéric Valette. 176-190 [doi]
- Simple Power Analysis of Unified Code for ECC Double and AddColin D. Walter. 191-204 [doi]
- DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-ConstructionKerstin Lemke, Kai Schramm, Christof Paar. 205-219 [doi]
- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic CurveLoren D. Olson. 220-229 [doi]
- Switching Blindings with a View Towards IDEAOlaf Neiße, Jürgen Pulkus. 230-239 [doi]
- Fault Analysis of Stream CiphersJonathan J. Hoch, Adi Shamir. 240-253 [doi]
- A Differential Fault Attack Against Early Rounds of (Triple-)DESLudger Hemme. 254-267 [doi]
- An Offset-Compensated Oscillator-Based Random Bit Source for Security ApplicationsHolger Bock, Marco Bucci, Raimondo Luzzi. 268-281 [doi]
- Improving the Security of Dual-Rail CircuitsDanil Sokolov, Julian Murphy, Alexandre V. Bystrov, Alexandre Yakovlev. 282-297 [doi]
- A New Attack with Side Channel Leakage During Exponent Recoding ComputationsYasuyuki Sakai, Kouichi Sakurai. 298-311 [doi]
- Defeating Countermeasures Based on Randomized BSD RepresentationsPierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette. 312-327 [doi]
- Pipelined Computation of Scalar Multiplication in Elliptic Curve CryptosystemsPradeep Kumar Mishra. 328-342 [doi]
- Efficient Countermeasures against RPA, DPA, and SPAHideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto. 343-356 [doi]
- Strong Authentication for RFID Systems Using the AES AlgorithmMartin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer. 357-370 [doi]
- TTS: High-Speed Signatures on a Low-Cost Smart CardBo-Yin Yang, Jiun-Ming Chen, Yen Hung Chen. 371-385 [doi]
- XTR Implementation on Reconfigurable HardwareEric Peeters, Michael Neve, Mathieu Ciet. 386-399 [doi]
- Concurrent Error Detection Schemes for Involution CiphersNikhil Joshi, Kaijie Wu, Ramesh Karri. 400-412 [doi]
- Public Key Authentication with One (Online) Single AdditionMarc Girault, David Lefranc. 413-427 [doi]
- Attacking DSA Under a Repeated Bits AssumptionPeter J. Leadbitter, Dan Page, Nigel P. Smart. 428-440 [doi]
- How to Disembed a Program?Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval. 441-454 [doi]