Abstract is missing.
- We Need AssuranceBrian D. Snow. 1 [doi]
- Factoring Large Numbers with the Twinkle Device (Extended Abstract)Adi Shamir. 2-12 [doi]
- DES Cracking on the Transmogrifier 2aIvan Hamer, Paul Chow. 13-24 [doi]
- Modelling the Crypto-Processor from Design to SynthesisW. P. Choi, Lee-Ming Cheng. 25-36 [doi]
- A DES ASIC Suitable for Network Encryption at 10 Gbps and BeyondD. Craig Wilcox, Lyndon G. Pierson, Perry J. Robertson, Edward L. Witzke, Karl Gass. 37-48 [doi]
- Hardware Design and Performance Estimation of the 128-bit Block Cipher CryptonEunjong Hong, Jai-Hoon Chung, Chae Hoon Lim. 49-60 [doi]
- Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara. 61-72 [doi]
- How to Implement Cost-Effective and Secure Public Key CryptosystemsPil Joong Lee, Eun Jeong Lee, Yong Duk Kim. 73-79 [doi]
- Montgomery s Multiplication Technique: How to Make It Smaller and FasterColin D. Walter. 80-93 [doi]
- A Scalable Architecture for Montgomery MultiplicationAlexandre F. Tenca, Çetin Kaya Koç. 94-108 [doi]
- Arithmetic Design for Permutation GroupsTamás Horváth. 109-121 [doi]
- Fast Multiplication in Finite Fields GF(2:::N:::)Joseph H. Silverman. 122-134 [doi]
- Efficient Finite Field Basis Conversion Involving Dual BasesBurton S. Kaliski Jr., Moses Liskov. 135-143 [doi]
- Power Analysis Attacks of Modular Exponentiation in SmartcardsThomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan. 144-157 [doi]
- DES and Differential Power Analysis (The Duplication Method)Louis Goubin, Jacques Patarin. 158-172 [doi]
- IPA: A New Class of Power AttacksPaul N. Fahn, Peter K. Pearson. 173-186 [doi]
- Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card SystemsEberhard von Faber. 187-203 [doi]
- A Design of Reliable True Random Number Generator for Cryptographic ApplicationsVittorio Bagini, Marco Bucci. 204-218 [doi]
- Random Number Generators Founded on Signal and Information TheoryDavid Paul Maher, Robert J. Rance. 219-230 [doi]
- A High-Performance Flexible Architecture for CryptographyR. Reed Taylor, Seth Copen Goldstein. 231-245 [doi]
- CryptoBooster: A Reconfigurable and Modular Cryptographic CoprocessorEmeka Mosanya, Christof Teuscher, Héctor Fabio Restrepo, Patrick Galley, Eduardo Sanchez. 246-256 [doi]
- Elliptic Curve Scalar Multiplier Design Using FPGAsLijun Gao, Sarvesh Shrivastava, Gerald E. Sobelman. 257-268 [doi]
- Highly Regular Architectures for Finite Field Computation Using Redundant BasisHuapeng Wu, M. Anwarul Hasan, Ian F. Blake. 269-279 [doi]
- Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial BasisHuapeng Wu. 280-291 [doi]
- Resistance against Differential Power Analysis for Elliptic Curve CryptosystemsJean-Sébastien Coron. 292-302 [doi]
- Probing Attacks on Tamper-Resistant DevicesHelena Handschuh, Pascal Paillier, Jacques Stern. 303-315 [doi]
- Fast Multiplication on Elliptic Curves over GF(2:::m:::) without PrecomputationJulio López, Ricardo Dahab. 316-327 [doi]
- NICE - New Ideal Coset EncryptionMichael Hartmann, Sachar Paulus, Tsuyoshi Takagi. 328-339 [doi]
- Encryption with Statistical Self-Synchronization in Synchronous Broadband NetworksOliver Jung, Christoph Ruland. 340-352 [doi]