Abstract is missing.
- The Security Challenges of Ubiquitous ComputingFrank Stajano. 1
- Multi-channel AttacksDakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi. 2-16 [doi]
- Hidden Markov Model CryptoanalysisChris Karlof, David Wagner. 17-34 [doi]
- Power-Analysis Attacks on an FPGA - First Experimental ResultsSiddika Berna Örs, Elisabeth Oswald, Bart Preneel. 35-50 [doi]
- Hardware to Solve Sparse Systems of Linear Equations over GF(2)Willi Geiselmann, Rainer Steinwandt. 51-61 [doi]
- Cryptanalysis of DES Implemented on Computers with CacheYukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi. 62-76 [doi]
- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZADGilles Piret, Jean-Jacques Quisquater. 77-88 [doi]
- A New Algorithm for Switching from Arithmetic to Boolean MaskingJean-Sébastien Coron, Alexei Tchulkine. 89-97 [doi]
- DeKaRT: A New Paradigm for Key-Dependent Reversible CircuitsJovan Dj. Golic. 98-112 [doi]
- Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block CiphersRamesh Karri, Grigori Kuznetsov, Michael Gössel. 113-124 [doi]
- Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card TechnologyKris Tiri, Ingrid Verbauwhede. 125-136 [doi]
- Security Evaluation of Asynchronous CircuitsJacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor. 137-151 [doi]
- Design and Implementation of a True Random Number Generator Based on Digital Circuit ArtifactsMichael Epstein, Laszlo Hars, Raymond Krasinski, Martin Rosner, Hao Zheng. 152-165 [doi]
- True Random Number Generators Secure in a Changing EnvironmentBoaz Barak, Ronen Shaltiel, Eran Tromer. 166-180 [doi]
- How to Predict the Output of a Hardware Random Number GeneratorMarkus Dichtl. 181-188 [doi]
- On Low Complexity Bit Parallel Polynomial Basis MultipliersArash Reyhani-Masoleh, M. Anwarul Hasan. 189-202 [doi]
- Efficient Modular Reduction Algorithm in IF::q::[x] and Its Application to Left to Right Modular Multiplication in IF::2::[x]Jean-François Dhem. 203-213 [doi]
- Faster Double-Size Modular Multiplication from Euclidean MultipliersBenoît Chevallier-Mames, Marc Joye, Pascal Paillier. 214-227 [doi]
- Efficient Exponentiation for a Class of Finite Fields GF(2 :::n:::) Determined by Gauss PeriodsSoonhak Kwon, Chang Hoon Kim, Chun-Pyo Hong. 228-242 [doi]
- GCD-Free Algorithms for Computing Modular InversesMarc Joye, Pascal Paillier. 243-253 [doi]
- Attacking Unbalanced RSA-CRT Using SPAPierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard. 254-268 [doi]
- The Doubling Attack - ::::Why Upwards Is Better than Downwards::::Pierre-Alain Fouque, Frédéric Valette. 269-280 [doi]
- An Analysis of Goubin s Refined Power Analysis AttackNigel P. Smart. 281-290 [doi]
- A New Type of Timing Attack: Application to GPSJulien Cathalo, François Koeune, Jean-Jacques Quisquater. 291-303 [doi]
- Unified Hardware Architecture for 128-Bit Block Ciphers AES and CamelliaAkashi Satoh, Sumio Morioka. 304-318 [doi]
- Very Compact FPGA Implementation of the AES AlgorithmPawel Chodowiec, Kris Gaj. 319-333 [doi]
- Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design TradeoffsFrançois-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat. 334-350 [doi]
- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic CurvesJan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Christof Paar. 351-365 [doi]
- Countermeasures against Differential Power Analysis for Hyperelliptic Curve CryptosystemsRoberto Maria Avanzi. 366-381 [doi]
- A Practical Countermeasure against Address-Bit Differential Power AnalysisKouichi Itoh, Tetsuya Izu, Masahiko Takenaka. 382-396 [doi]
- A More Flexible Countermeasure against Side Channel Attacks Using Window MethodKatsuyuki Okeya, Tsuyoshi Takagi. 397-410 [doi]
- On the Security of PKCS#11Jolyon Clulow. 411-425 [doi]
- Attacking RSA-Based Sessions in SSL/TLSVlastimil Klíma, Ondrej Pokorný, Tomás Rosa. 426-440 [doi]