Presentations

 
 
 
 
 
 
 
 
 
 Invited talks on application of reconfigurable logic devices in cryptography
 
M. McLoone: High Speed SHACAL-2 Hardware Architecture
K. Gaj: Cryptographic libraries for high-end reconfigurable computers
K. Gaj: Implementation of the matrix step of the Number Field Sieve factorization algorithm in reconfigurable hardware
I. Toli: Keyspace Redundancies of the HFE and Implications on Its Implementation
J. Pelzl, M. Simka: Hardware-based Factorization of Integers with the Elliptic Curve Method: Part I
M. Simka, J. Pelzl: Hardware-based Factorization of Integers with the Elliptic Curve Method: Part II
M. Renaudin: Introduction to Asynchronous Logic
M. Renaudin: Improving DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
F. Bouesse: Designing Resistant Asynchronous Circuits Against Malicious Fault Injection
F. Bouesse: Prototyping Asynchronous Circuits on LUT-based FPGAs
L. Torres: Current Masking Generation Technique: A Case Study
A. Razafindraibe, P. Maurine: Asynchronous Techniques Against DPA Attack
S. Guilley: CMOS structures and CAD Methods for the Design of DPA-proof ASICs
L. Torres, D. Mesquita: Reconfigurable Architecture for Cryptography
M. Drutarovsky: An Optimization of Scalable Montgomery Coprocessor Embedded in Reconfigurable Hardware
M. Drutarovsky: Comments on the NIST Statistical Testing of a PLL-based TRNG Embedded in FPGA
V. Fischer: On the Security of FPGA-based Architectures
S. Guilley: Secured FPGAs

Updated frequently ...