Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,278
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Cryptographic Hardware and Embedded Systems — CHES 2001
other
Editor(s):
Çetin K. Koç
,
David Naccache
,
Christof Paar
Publication date
(Online):
September 20 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Author and book information
Book
ISBN (Print):
978-3-540-42521-2
ISBN (Electronic):
978-3-540-44709-2
Publication date (Print):
2001
Publication date (Online):
September 20 2001
DOI:
10.1007/3-540-44709-1
SO-VID:
24ec9e6d-c814-4e7e-b81e-927e7af1994e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
A Sound Method for Switching between Boolean and Arithmetic Masking
pp. 51
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm
pp. 65
High Performance Single-Chip FPGA Rijndael Algorithm Implementations
pp. 77
Two Methods of Rijndael Implementation in Reconfigurable Hardware
pp. 118
The Hessian Form of an Elliptic Curve
pp. 171
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
pp. 251
Electromagnetic Analysis: Concrete Results
pp. 309
An Implementation of DES and AES, Secure against Some Attacks
pp. 333
Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA
pp. 377
Protections against Differential Analysis for Elliptic Curve Cryptography — An Algebraic Approach —
pp. 391
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
pp. 402
Hessian Elliptic Curves and Side-Channel Attacks
Similar content
4,278
2013 CHES Annual Conference
Authors:
M Xiang
La place des belles-filles dans l'univers de la prise en charge des parents [acaron]gés ches les italiens de Montréal. (Daughters-in-law's place in the universe of caregiving to elderly parents among Italians in Montreal), mimeographed document, Université du Québec à Montréal.
Authors:
M. Mousseau-Glaser
Proc. Cryptographic Hardware and Embedded Systems (CHES 2001)
Authors:
A. Rudra
,
P.K. Dubey
,
C.S. Jutla
…
See all similar
Cited by
1
Security Vulnerabilities Against Fingerprint Biometric System
Authors:
Bodhisatwa Mazumdar
,
Mahesh Prasad Joshi
,
Somnath Dey
See all cited by