{"entities":{"Q1763013":{"pageid":1773755,"ns":120,"title":"Item:Q1763013","lastrevid":68895573,"modified":"2026-04-13T02:57:31Z","type":"item","id":"Q1763013","labels":{"en":{"language":"en","value":"Cryptographic hardware and embedded systems -- CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11--13, 2004. Proceedings."}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 2134822"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1763013$94114AE7-5059-4B3D-8F5D-DB57292C79F3","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"b07feb5d7a9e55cf1b43102414ca5eeb24c09fce","datavalue":{"value":{"text":"Cryptographic hardware and embedded systems -- CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11--13, 2004. Proceedings.","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1763013$E8D217EA-2A1E-4D9E-87ED-6727EDC97B8A","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"b89c1327224da72abc1cbc2aba40063c1bb4f14a","datavalue":{"value":"1056.68012","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$2F9E674B-6D2F-4A6C-88A8-6DDF12BA0345","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1763013$B458A4E3-5CD2-48FB-9F5F-50D8194B7F9C","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"b7bdaafc754b21c441823c02d0a8e143cfd1e134","datavalue":{"value":{"time":"+2005-02-18T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1763013$06AD27FF-DDA4-4E23-95DA-2B8BABB1FA83","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"6421b6c0cfed0c1785274206508924c11c2f821d","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1027.00034).  Indexed articles:  \\textit{Waddle, Jason; Wagner, David}, Towards efficient second-order power analysis, 1-15 [Zbl 1104.68499]  \\textit{Brier, Eric; Clavier, Christophe; Olivier, Francis}, Correlation power analysis with a leakage model, 16-29 [Zbl 1104.68467]  \\textit{Standaert, Fran\u00e7ois-Xavier; \u00d6rs, S\u0131dd\u0131ka Berna; Preneel, Bart}, Power analysis of an FPGA. Implementation of Rijndael: is pipelining a DPA countermeasure?, 30-44 [Zbl 1104.68498]  \\textit{Hars, Laszlo}, Long modular multiplication for cryptographic applications, 45-61 [Zbl 1104.68477]  \\textit{Bajard, Jean-Claude; Imbert, Laurent; Liardet, Pierre-Yvan; Teglia, Yannick}, Leak resistant arithmetic, 62-75 [Zbl 1104.68464]  \\textit{Kwon, Soonhak; Gaj, Kris; Kim, Chang Hoon; Hong, Chun Pyo}, Efficient linear array for multiplication in GF\\((2^{m})\\) using a normal basis for elliptic curve cryptography, 76-91 [Zbl 1104.68482]  \\textit{\u00d6zt\u00fcrk, E.; Sunar, B.; Sava\u015f, E.}, Low-power elliptic curve cryptography using scaled modular arithmetic, 92-106 [Zbl 1104.68493]  \\textit{Aigner, Harald; Bock, Holger; H\u00fctter, Markus; Wolkerstorfer, Johannes}, A low-cost ECC coprocessor for smartcards, 107-118 [Zbl 1104.68462]  \\textit{Gura, Nils; Patel, Arun; Wander, Arvinderpal; Eberle, Hans; Shantz, Sheueling Chang}, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, 119-132 [Zbl 1104.68476]  \\textit{Gro\u00dfsch\u00e4dl, Johann; Sava\u015f, Erkay}, Instruction set extensions for fast arithmetic in finite fields GF\\((p)\\) and GF\\((2^{m})\\), 133-147 [Zbl 1104.68475]  \\textit{Avanzi, Roberto Maria}, Aspects of hyperelliptic curves over large prime fields in software implementations, 148-162 [Zbl 1104.68463]  \\textit{Schramm, Kai; Leander, Gregor; Felke, Patrick; Paar, Christof}, A collision-attack on AES. Combining side channel- and differential-attack., 163-175 [Zbl 1104.68496]  \\textit{Ledig, Herv\u00e9; Muller, Fr\u00e9d\u00e9ric; Valette, Fr\u00e9d\u00e9ric}, Enhancing collision attacks, 176-190 [Zbl 1104.68484]  \\textit{Walter, Colin D.}, Simple power analysis of unified code for ECC double and add, 191-204 [Zbl 1104.68500]  \\textit{Lemke, Kerstin; Schramm, Kai; Paar, Christof}, DPA on \\(n\\)-bit sized Boolean and arithmetic operations and its application to IDEA, RC6, and the HMAC-construction, 205-219 [Zbl 1104.68485]  \\textit{Olson, Loren D.}, Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve, 220-229 [Zbl 1104.68492]  \\textit{Nei\u00dfe, Olaf; Pulkus, J\u00fcrgen}, Switching blindings with a view towards IDEA, 230-239 [Zbl 1104.68491]  \\textit{Hoch, Jonathan J.; Shamir, Adi}, Fault analysis of stream ciphers, 240-253 [Zbl 1104.68479]  \\textit{Hemme, Ludger}, A differential fault attack against early rounds of (Triple-)DES, 254-267 [Zbl 1104.68478]  \\textit{Bock, Holger; Bucci, Marco; Luzzi, Raimondo}, An offset-compensated oscillator-based random bit source for security applications, 268-281 [Zbl 1104.68466]  \\textit{Sokolov, Danil; Murphy, Julian; Bystrov, Alex; Yakovlev, Alex}, Improving the security of dual-rail circuits, 282-297 [Zbl 1104.68497]  \\textit{Sakai, Yasuyuki; Sakurai, Kouichi}, A new attack with side channel leakage during exponent recoding computations, 298-311 [Zbl 1104.68495]  \\textit{Fouque, Pierre-Alain; Muller, Fr\u00e9d\u00e9ric; Poupard, Guillaume; Valette, Fr\u00e9d\u00e9ric}, Defeating countermeasures based on randomized BSD representations, 312-327 [Zbl 1104.68472]  \\textit{Mishra, Pradeep Kumar}, Pipelined computation of scalar multiplication in elliptic curve cryptosystems, 328-342 [Zbl 1104.68489]  \\textit{Mamiya, Hideyo; Miyaji, Atsuko; Morimoto, Hiroaki}, Efficient countermeasures against RPA, DPA, and SPA, 343-356 [Zbl 1104.68488]  \\textit{Feldhofer, Martin; Dominikus, Sandra; Wolkerstorfer, Johannes}, Strong authentication for RFID systems using the AES algorithm, 357-370 [Zbl 1104.68471]  \\textit{Yang, Bo-Yin; Chen, Jiun-Ming; Chen, Yen-Hung}, TTS: High-speed signatures on a low-cost smart card, 371-385 [Zbl 1104.68502]  \\textit{Peeters, Eric; Neve, Michael; Ciet, Mathieu}, XTR implementation on reconfigurable hardware, 386-399 [Zbl 1104.68494]  \\textit{Joshi, Nikhil; Wu, Kaijie; Karri, Ramesh}, Concurrent error detection schemes for involution ciphers, 400-412 [Zbl 1104.68481]  \\textit{Girault, Marc; Lefranc, David}, Public key authentication with one (online) single addition, 413-427 [Zbl 1104.68474]  \\textit{Leadbitter, P. J.; Page, D.; Smart, N. P.}, Attacking DSA under a repeated bits assumption, 428-440 [Zbl 1104.68483]  \\textit{Chevallier-Mames, Beno\u00eet; Naccache, David; Paillier, Pascal; Pointcheval, David}, How to disembed a program? (Extended abstract), 441-454 [Zbl 1104.68469]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1763013$94FF7055-3D93-43DF-8565-2419D57C6299","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$05F51A86-7C80-4EFA-B6CF-5780E2360FD6","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$7E9F5E6C-F825-425C-89A1-C9B05048D13C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$956A8CB8-CE03-4B93-8035-A8C5CB6023E4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$2ECA36BD-4D07-42B5-B59A-F35B95B3500B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$0E5EB24C-4D48-4784-AA07-873561E99A9B","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"03c38dd3905e1a0fed3616db93f70b1637d3f326","datavalue":{"value":"2134822","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$66DD6328-F7FE-46F9-9BFA-03504B6DA437","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1763013$7C451781-F059-49C8-8727-35BEDB7076A7","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"1e8bc016969e56fbd8d71ec1294b63e153195995","datavalue":{"value":"https://doi.org/10.1007/b99451","type":"string"},"datatype":"url"},"type":"statement","id":"Q1763013$60288BAF-904D-4944-8FC2-789B4889A883","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"350d0d5f1f84182816ac21d506a3b31d8867c83e","datavalue":{"value":"W2491896407","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$560DEF91-9EDE-4CA1-97A8-A7AC0DB5E955","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"0ddc8d42e285319a6094abd76da929aae2dfdaf0","datavalue":{"value":"10.1007/B99451","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763013$7334B929-13F0-49C7-829C-225280B2FB24","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Cryptographic hardware and embedded systems -- CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11--13, 2004. Proceedings.","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Cryptographic_hardware_and_embedded_systems_--_CHES_2004._6th_international_workshop,_Cambridge,_MA,_USA,_August_11--13,_2004._Proceedings."}}}}}