Invited talks on application of reconfigurable logic devices in cryptography |
|
E. Dottax: |
High-speed FPGA Implementation of RSA |
M. Drutarovsky: |
The MAGMA Package in Cryptography Teaching |
V. Fischer: |
Secured TRBG with Embedded Randomness Testing |
K. Gaj: |
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware |
G. Gogniat: |
Reconfigurable Security Architecture for Embedded Systems |
T. Güneysu: |
On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware |
V. Lacko: |
Key Management in Security Application |
R. Lorenz: |
Comparison of FPGA and ASIC Implementations of Subtraction-free Almost Montgomery Inverse |
P. Moore: |
Architecture for Generic Symmetric Key Instruction Set for FPGA based CPUs |
M. Novotny: |
Normal Basis Multipliers of General Digit Width |
J. Pelzl: |
COPACOBANA - A Cost-Optimized Parallel Architecture for Code Breaking |
J. Pelzl: |
AT-Efficient Architecture for Solving Linear Systems of Equations over GF(2) |
P. Piasentin: |
Actel Fusion - FPGA Family with Enhanced Security Features |
M. Rogawski: |
FPGA-based Crypto Co-processors with Stream Ciphers |
L. Torres: |
A Leak Resistant Architecture Against Side Channel Attacks |
R. Vaslin: |
Secure Architecture in Embedded Systems: An Overview |