↓ Skip to main content

Cryptographic Hardware and Embedded Systems - CHES 2004

Overview of attention for book
Cover of 'Cryptographic Hardware and Embedded Systems - CHES 2004'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Towards Efficient Second-Order Power Analysis
  3. Altmetric Badge
    Chapter 2 Correlation Power Analysis with a Leakage Model
  4. Altmetric Badge
    Chapter 3 Power Analysis of an FPGA
  5. Altmetric Badge
    Chapter 4 Long Modular Multiplication for Cryptographic Applications
  6. Altmetric Badge
    Chapter 5 Leak Resistant Arithmetic
  7. Altmetric Badge
    Chapter 6 Efficient Linear Array for Multiplication in GF (2 m ) Using a Normal Basis for Elliptic Curve Cryptography
  8. Altmetric Badge
    Chapter 7 Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
  9. Altmetric Badge
    Chapter 8 A Low-Cost ECC Coprocessor for Smartcards
  10. Altmetric Badge
    Chapter 9 Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
  11. Altmetric Badge
    Chapter 10 Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p ) and GF(2 m )
  12. Altmetric Badge
    Chapter 11 Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
  13. Altmetric Badge
    Chapter 12 A Collision-Attack on AES
  14. Altmetric Badge
    Chapter 13 Enhancing Collision Attacks
  15. Altmetric Badge
    Chapter 14 Simple Power Analysis of Unified Code for ECC Double and Add
  16. Altmetric Badge
    Chapter 15 DPA on n -Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
  17. Altmetric Badge
    Chapter 16 Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
  18. Altmetric Badge
    Chapter 17 Switching Blindings with a View Towards IDEA
  19. Altmetric Badge
    Chapter 18 Fault Analysis of Stream Ciphers
  20. Altmetric Badge
    Chapter 19 A Differential Fault Attack Against Early Rounds of (Triple-)DES
  21. Altmetric Badge
    Chapter 20 An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications
  22. Altmetric Badge
    Chapter 21 Improving the Security of Dual-Rail Circuits
  23. Altmetric Badge
    Chapter 22 A New Attack with Side Channel Leakage During Exponent Recoding Computations
  24. Altmetric Badge
    Chapter 23 Defeating Countermeasures Based on Randomized BSD Representations
  25. Altmetric Badge
    Chapter 24 Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
  26. Altmetric Badge
    Chapter 25 Efficient Countermeasures against RPA, DPA, and SPA
  27. Altmetric Badge
    Chapter 26 Strong Authentication for RFID Systems Using the AES Algorithm
  28. Altmetric Badge
    Chapter 27 TTS: High-Speed Signatures on a Low-Cost Smart Card
  29. Altmetric Badge
    Chapter 28 XTR Implementation on Reconfigurable Hardware
  30. Altmetric Badge
    Chapter 29 Concurrent Error Detection Schemes for Involution Ciphers
  31. Altmetric Badge
    Chapter 30 Public Key Authentication with One (Online) Single Addition
  32. Altmetric Badge
    Chapter 31 Attacking DSA Under a Repeated Bits Assumption
  33. Altmetric Badge
    Chapter 32 How to Disembed a Program?
Attention for Chapter 6: Efficient Linear Array for Multiplication in GF (2 m ) Using a Normal Basis for Elliptic Curve Cryptography
Altmetric Badge

Citations

dimensions_citation
23 Dimensions

Readers on

mendeley
33 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Efficient Linear Array for Multiplication in GF (2 m ) Using a Normal Basis for Elliptic Curve Cryptography
Chapter number 6
Book title
Cryptographic Hardware and Embedded Systems - CHES 2004
Published by
Springer, Berlin, Heidelberg, August 2004
DOI 10.1007/978-3-540-28632-5_6
Book ISBNs
978-3-54-022666-6, 978-3-54-028632-5
Authors

Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong, Kwon, Soonhak, Gaj, Kris, Kim, Chang Hoon, Hong, Chun Pyo

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 33 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 33 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 24%
Student > Master 8 24%
Researcher 5 15%
Professor 3 9%
Lecturer 2 6%
Other 5 15%
Unknown 2 6%
Readers by discipline Count As %
Computer Science 21 64%
Engineering 4 12%
Mathematics 2 6%
Physics and Astronomy 2 6%
Design 1 3%
Other 0 0%
Unknown 3 9%