2. CHES 2000:
Worcester, MA, USA
Implementation of Elliptic Curve Cryptosystems
Power and Timing Analysis Attacks
: Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies.
: Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards.
M. Anwarul Hasan
: Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems.
: A Timing Attack against RSA with the Chinese Remainder Theorem.
Hadrware Implementation of Block Cyphers
: High-Speed RSA Hardware Based on Barret's Modular Reduction Method.
Colin D. Walter
: Data Integrity in Hardware for Modular Arithmetic.
: Montgomery Multiplier and Squarer in GF(2m).
Physical Security and Cryptanalysis
Steve H. Weingart
: Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences.
New Schemes and Algorithms