{"entities":{"Q5947953":{"pageid":8124755,"ns":120,"title":"Item:Q5947953","lastrevid":31855643,"modified":"2024-03-19T19:54:50Z","type":"item","id":"Q5947953","labels":{"en":{"language":"en","value":"Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14--16, 2001. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1666881"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5947953$51403EAE-FAF3-4926-BF20-CCBDC8EF9F28","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"0e7cf20785fc99e8324426ae554dbb5ee39aaaed","datavalue":{"value":{"text":"Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14--16, 2001. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5947953$77046A55-86B2-4C68-863E-96FE95C1EC59","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"613663e910162a8de2ad8f97a715be811aa29412","datavalue":{"value":"0971.00042","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$45D1933F-91C0-44DC-B841-E80A642D8D78","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"4f739e63b303444fcdb485381910ff78c9be5b9f","datavalue":{"value":"10.1007/3-540-44709-1","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$86AB6F9C-07D8-470A-9558-97A18D802930","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5947953$DE01ABD8-CD85-4632-AB0D-AA2DF346D762","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"db3817d161b0670e4149da15035f59b540781716","datavalue":{"value":{"time":"+2001-10-24T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5947953$646CB2EC-1725-4943-A645-72390708D942","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"83bf4a0e7a4198f6bd4b2300ca96e8774433a93c","datavalue":{"value":"The articles of mathematical interest will be reviewed individually. The preceding workshop (2nd, 2000) has been reviewed (see Zbl 0953.00047).  Indexed articles:  \\textit{Anderson, Ross}, Protecting embedded systems -- the next ten years, 1-2 [Zbl 1006.68710]  \\textit{Goubin, Louis}, A sound method for switching between Boolean and arithmetic masking, 3-15 [Zbl 1013.94542]  \\textit{Brier, Eric; Handschuh, Helena; Tymen, Christophe}, Fast primitives for internal data scrambling in tamper resistant hardware, 16-27 [Zbl 1012.94545]  \\textit{May, D.; Muller, H. L.; Smart, N. P.}, Random register renaming to foil DPA, 28-38 [Zbl 1006.68712]  \\textit{Oswald, Elisabeth; Aigner, Manfred}, Randomized addition-subtraction chains as a countermeasure against power attacks, 39-50 [Zbl 1012.94549]  \\textit{Kuo, Henry; Verbauwhede, Ingrid}, Architectural optimization for a 1. 82 Gbits/sec VLSI implementation of the AES Rijndael algorithm, 51-64 [Zbl 1007.68992]  \\textit{McLoone, M\u00e1ire; McCanny, J. V.}, High performance single-chip FPGA Rijndael algorithm implementations, 65-76 [Zbl 1006.68706]  \\textit{Fischer, Viktor; Drutarovsk\u00fd, Milo\u0161}, Two methods of Rijndael implementation in reconfigurable hardware, 77-92 [Zbl 1006.68715]  \\textit{Howgrave-Graham, Nick; Dyer, Joan; Gennaro, Rosario}, Pseudo-random number generation on the IBM 4758 secure crypto coprocessor, 93-102 [Zbl 1006.68711]  \\textit{Schindler, Werner}, Efficient online tests for true random number generators, 103-117 [Zbl 1006.68704]  \\textit{Smart, N. P.}, The Hessian form of an elliptic curve, 118-125 [Zbl 1021.94522]  \\textit{Okeya, Katsuyuki; Sakurai, Kouichi}, Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the \\(y\\)-coordinate on a Montgomery-form elliptic curve, 126-141 [Zbl 1012.94551]  \\textit{Sava\u015f, Erkay; Schmidt, Thomas A.; Ko\u00e7, \u00c7etin K.}, Generating elliptic curves of prime order, 142-158 [Zbl 1012.94546]  \\textit{Shamir, Adi}, New directions in croptography, 159 [Zbl 1006.68708]  \\textit{Leone, Manuel}, A new low complexity parallel multiplier for a class of finite fields, 160-170 [Zbl 1012.94541]  \\textit{Rudra, Atri; Dubey, Pradeep K.; Jutla, Charanjit S.; Kumar, Vijay; Rao, Josyula R.; Rohatgi, Pankaj}, Efficient Rijndael encryption implementation with composite field arithmetic, 171-184 [Zbl 1012.94544]  \\textit{Tenca, Alexandre F.; Todorov, Georgi; Ko\u00e7, \u00c7etin K.}, High-radix design of a scalable modular multiplier, 185-201 [Zbl 1006.68707]  \\textit{Gro\u00dfsch\u00e4dl, Johann}, A bit-serial unified multiplier architecture for finite fields \\(\\text{GF}(p)\\) and \\(\\text{GF}(2^m)\\), 202-219 [Zbl 1006.68720]  \\textit{Bond, Mike}, Attacks on cryptoprocessor transaction sets, 220-234 [Zbl 1007.68993]  \\textit{Young, Adam; Yung, Moti}, Bandwidth-optimal kleptographic attacks, 235-250 [Zbl 1012.94542]  \\textit{Gandolfi, Karine; Mourtel, Christophe; Olivier, Francis}, Electromagnetic analysis: concrete results, 251-261 [Zbl 1006.68705]  \\textit{Bailey, Daniel V.; Coffin, Daniel; Elbirt, Adam; Silverman, Joseph H.; Woodbury, Adam D.}, NTRU in constrained devices, 262-272 [Zbl 1012.94548]  \\textit{Pornin, Thomas}, Transparent harddisk encryption, 273-285 [Zbl 1006.68714]  \\textit{Walter, C. D.}, Sliding Windows succumbs to Big Mac attack, 286-299 [Zbl 1007.68994]  \\textit{Clavier, Christophe; Joye, Marc}, Universal exponentiation algorithm. A first step towards provable SPA-resistance, 300-308 [Zbl 1007.68995]  \\textit{Akkar, Mehdi-Laurent; Giraud, Christophe}, An implementation of DES and AES, secure against some attacks, 309-318 [Zbl 1006.68702]  \\textit{Sarkar, Palash; Maitra, Subhamoy}, Efficient implementation of ``large'' stream cipher systems, 319-332 [Zbl 1012.94540]  \\textit{Cheung, O. Y. H.; Tsoi, K. H.; Leong, P. H. W.; Leong, M. P.}, Tradeoffs in parallel and serial implementations of the international data encryption algorithm IDEA, 333-347 [Zbl 1006.68718]  \\textit{Orlando, Gerardo; Paar, Christof}, A scalable \\(\\text{GF}(p)\\) elliptic curve processor architecture for programmable hardware, 348-363 [Zbl 1006.68721]  \\textit{Nozaki, Hanae; Motoyama, Masahiko; Shimbo, Atsushi; Kawamura, Shinichi}, Implementation of RSA algorithm based on RNS Montgomery multiplication, 364-376 [Zbl 1007.68996]  \\textit{Joye, Marc; Tymen, Christophe}, Protections against differential analysis for elliptic curve cryptography. An algebraic approach, 377-390 [Zbl 1012.94550]  \\textit{Liardet, P.-Y.; Smart, N. P.}, Preventing SPA/DPA in ECC systems using the Jacobi form, 391-401 [Zbl 1012.94552]  \\textit{Joye, Marc; Quisquater, Jean-Jacques}, Hessian elliptic curves and side-channel attacks, 402-410 [Zbl 1012.94547]","type":"string"},"datatype":"string"},"type":"statement","id":"Q5947953$27FBBB4F-9DC2-43EF-82D9-3AD1A2E67974","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$E8C0FF92-CD90-4805-BF56-6E9E7998F7D9","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$2E28BC56-0664-459C-AA66-39ED173497E3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$3C7ECCEA-EE3D-45E0-AD3E-B1EA7434394B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$AD0DF19B-8E87-417A-9413-B76FE0124A18","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"9c88d966dc84ee41566ed79f69d7bcf0bf9bc908","datavalue":{"value":"1666881","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$1DBB62DE-461F-4869-86E1-1F812E00B723","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"72f3e15ac9e86afcca52f0008f9a9b51ca2ef38e","datavalue":{"value":"Paris (France)","type":"string"},"datatype":"string"},"type":"statement","id":"Q5947953$4326AED9-7948-42F8-B38C-87F87242FE10","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q5947953$B8FBC154-71C4-45E4-A6CD-41DF4E0895CC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"f7c2172f0a2ed6197400daa3f44dae0d79725b1a","datavalue":{"value":"Workshop","type":"string"},"datatype":"string"},"type":"statement","id":"Q5947953$90894218-89A1-458D-ABE9-B0F01EC27E05","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"04b9a4294755037418002b3f374869b801561c4b","datavalue":{"value":"CHES 2001","type":"string"},"datatype":"string"},"type":"statement","id":"Q5947953$2C27C2E9-7CB1-483C-98A2-7723D58AE22C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"ceb4faf43b8abb9aa9af4f2ba75287d015d6d35e","datavalue":{"value":"Cryptographic hardware","type":"string"},"datatype":"string"},"type":"statement","id":"Q5947953$4EBC4D8C-49EC-4D2E-AA22-79F72EF85B8B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"90e23dd11b7f15033ed48990579b543ea70c6bbe","datavalue":{"value":"Embedded systems","type":"string"},"datatype":"string"},"type":"statement","id":"Q5947953$3150CF15-BF9D-4068-B448-12CA51515109","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5947953$4EF0B463-BDF1-4034-A3C9-9275F5F93D46","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"f73d9b7865b7e42cbdf8a04fb82d6714dcc839b5","datavalue":{"value":"https://doi.org/10.1007/3-540-44709-1","type":"string"},"datatype":"url"},"type":"statement","id":"Q5947953$4B212C7B-BC06-4A64-931C-A5D27D258B4E","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"da252ad99565db3545434cad3bf5c793b982ddce","datavalue":{"value":"W2478327424","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5947953$62AF4D6B-EBC7-4512-8EFC-2056FC095899","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5947953","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5947953"}}}}}