| Invited talks on application of reconfigurable logic devices in cryptography |
| |
| E. Dottax: |
High-speed FPGA Implementation of RSA |
| M. Drutarovsky: |
The MAGMA Package in Cryptography Teaching |
| V. Fischer: |
Secured TRBG with Embedded Randomness Testing |
| K. Gaj: |
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware |
| G. Gogniat: |
Reconfigurable Security Architecture for Embedded Systems |
| T. Güneysu: |
On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware |
| V. Lacko: |
Key Management in Security Application |
| R. Lorenz: |
Comparison of FPGA and ASIC Implementations of Subtraction-free Almost Montgomery Inverse |
| P. Moore: |
Architecture for Generic Symmetric Key Instruction Set for FPGA based CPUs |
| M. Novotny: |
Normal Basis Multipliers of General Digit Width |
| J. Pelzl: |
COPACOBANA - A Cost-Optimized Parallel Architecture for Code Breaking |
| J. Pelzl: |
AT-Efficient Architecture for Solving Linear Systems of Equations over GF(2) |
| P. Piasentin: |
Actel Fusion - FPGA Family with Enhanced Security Features |
| M. Rogawski: |
FPGA-based Crypto Co-processors with Stream Ciphers |
| L. Torres: |
A Leak Resistant Architecture Against Side Channel Attacks |
| R. Vaslin: |
Secure Architecture in Embedded Systems: An Overview |