What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CHES 2005
Year
Venue
Title
2005
CHES
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis
Jean-Sébastien Coron
David Lefranc
Guillaume Poupard
2005
CHES
A Stochastic Model for Differential Side Channel Cryptanalysis
Werner Schindler
Kerstin Lemke
Christof Paar
2005
CHES
A Very Compact S-Box for AES
David Canright
2005
CHES
AES on FPGA from the Fastest to the Smallest
Tim Good
Mohammed Benaissa
2005
CHES
Bipartite Modular Multiplication
Marcelo E. Kaihara
Naofumi Takagi
2005
CHES
Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings
Berk Sunar
David Cyganski
2005
CHES
Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings
2005
CHES
Data Remanence in Flash Memory Devices
Sergei P. Skorobogatov
2005
CHES
Design of Testable Random Bit Generators
Marco Bucci
Raimondo Luzzi
2005
CHES
DPA Leakage Models for CMOS Logic Circuits
Daisuke Suzuki
Minoru Saeki
Tetsuya Ichikawa
2005
CHES
Efficient Hardware for the Tate Pairing Calculation in Characteristic Three
Tim Kerins
William P. Marnane
Emanuel M. Popovici
Paulo S. L. M. Barreto
2005
CHES
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA
Catherine H. Gebotys
Simon Ho
C. C. Tiu
2005
CHES
Energy-Efficient Software Implementation of Long Integer Modular Arithmetic
Johann Großschädl
Roberto Maria Avanzi
Erkay Savas
Stefan Tillich
2005
CHES
Fast Truncated Multiplication for Cryptographic Applications
Laszlo Hars
2005
CHES
Further Hidden Markov Model Cryptanalysis
P. J. Green
Richard Noad
Nigel P. Smart
2005
CHES
Hardware Acceleration of the Tate Pairing in Characteristic Three
Philipp Grabher
Daniel Page
2005
CHES
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP
Lejla Batina
David Hwang
Alireza Hodjat
Bart Preneel
Ingrid Verbauwhede
2005
CHES
Improved Higher-Order Side-Channel Attacks with FPGA Experiments
Eric Peeters
François-Xavier Standaert
Nicolas Donckers
Jean-Jacques Quisquater
2005
CHES
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints
Thomas Popp
Stefan Mangard
2005
CHES
Masking at Gate Level in the Presence of Glitches
Wieland Fischer
Berndt M. Gammel
2005
CHES
On Second-Order Differential Power Analysis
Marc Joye
Pascal Paillier
Berry Schoenmakers
2005
CHES
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment
Kris Tiri
David Hwang
Alireza Hodjat
Bo-Cheng Lai
Shenglin Yang
Patrick Schaumont
Ingrid Verbauwhede
2005
CHES
Resistance of Randomized Projective Coordinates Against Power Analysis
William Dupuy
Sébastien Kunz-Jacques
2005
CHES
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization
Willi Geiselmann
Adi Shamir
Rainer Steinwandt
Eran Tromer
2005
CHES
Secure Data Management in Trusted Computing
Ulrich Kühn
Klaus Kursawe
Stefan Lucks
Ahmad-Reza Sadeghi
Christian Stüble
2005
CHES
Security Evaluation Against Electromagnetic Analysis at Design Time
Huiyun Li
A. Theodore Markettos
Simon W. Moore
2005
CHES
Security Limits for Compromising Emanations
Markus G. Kuhn
2005
CHES
Security of Identification Products: How to Manage
★
Invited talk
Thomas Wille
2005
CHES
SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers
Jens Franke
Thorsten Kleinjung
Christof Paar
Jan Pelzl
Christine Priplata
Colin Stahlke
2005
CHES
Short Memory Scalar Multiplication on Koblitz Curves
Katsuyuki Okeya
Tsuyoshi Takagi
Camille Vuillaume
2005
CHES
Successfully Attacking Masked AES Hardware Implementations
★
Best Paper
Stefan Mangard
Norbert Pramstaller
Elisabeth Oswald
2005
CHES
Templates as Master Keys
Dakshi Agrawal
Josyula R. Rao
Pankaj Rohatgi
Kai Schramm
2005
CHES
The "Backend Duplication" Method
Sylvain Guilley
Philippe Hoogvorst
Yves Mathieu
Renaud Pacalet
2005
CHES
Trusted Computing in Embedded Systems
★
Invited talk
Jim Ward
2005
CHES
Using an RSA Accelerator for Modular Inversion
Martin Seysen
2005
CHES
What Identity Systems Can and Cannot Do
★
Invited talk
Ross J. Anderson