| Invited talks on application of reconfigurable logic devices in cryptography |
| |
| B. Badrignans: |
Reconfigurable cryptographic processor on FPGA |
| F. Bernard: |
Time-Area Tradeoffs Improvement for Montgomery Modular Multiplication Implementation |
| J.-L. Beuchat: |
Arithmetic Operators for Pairing-Based Cryptography |
| L. Bossuet, G. Gogniat: |
How to Teach Hardware Security? |
| J. Bucek, R. Lorenz: |
Comparison of Different Implementations of Montgomery Modular Inverse in Hardware |
| G. Di Natale: |
Test and Security |
| V. Fischer: |
Implementation of True Random Number Generators in (Reconfigurable) Logic Devices |
| K. Gaj: |
An Optimized Hardware Architecture of Montgomery Multiplication Algorithm |
| K. Gaj: |
Emerging New Stream Ciphers vs. AES: Comparative Study of Hardware Performance |
| P. Hoogvorst: |
Random and Pseudo-Random Variable Generation |
| M. Hubner: |
Exploiting Dynamic and Partial Reconfiguration for Cryptographic Applications |
| P. Piasentin: |
New Actel FPGA Families for Low-Power Systems on Chip |
| S. Roy, R. Santoro: |
New Architectures for the Diffie-Hellman Key Exchange Based on Elliptic Curves |
| R. Santoro, O. Sentieys: |
Accelerating Statistical Tests for Real-Time Estimation of Randomness |
| M. Simka: |
Requirements on Reconfigurable Platform for DRM Implementations |
| R. Tessier: |
Distributed On-Chip Monitoring for Secure Embedded Systems |
| R. Vaslin: |
High Efficiency Protection Solution for Off-Chip Memory in Embedded Systems |
| E. Wanderley: |
A Code Compression Method with Encryption and Integrity Checking |