5. CHES 2003:
: The Security Challenges of Ubiquitous Computing.
Side Channel Attack Methodology
Side Channel Attacks and Countermeasures
: Efficient Modular Reduction Algorithm in IFq[x] and Its Application to "Left to Right" Modular Multiplication in IF2[x].
More on Efficient Artihmetic
Attacks on Asymmetric Cryptosystems
Implementation of Symmetric Ciphers
Hyperelliptic Curve Cryptography
Countermeasures to Side Channel Leakage