Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,759 papers from all fields of science
Search
Sign In
Create Free Account
Workshop on Cryptographic Hardware and Embedded Systems
Known as:
CHES
Workshop on Cryptographic Hardware and Embedded Systems (CHES) is a workshop for cryptography research, focusing on the implementation of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Asiacrypt
Cryptography
Eurocrypt
Fast Software Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731
L. Batina
,
M. Robshaw
Workshop on Cryptographic Hardware and Embedded…
2014
Corpus ID: 63994143
2013
2013
Proposals of Multiplication and Inversion Methods in Extension Field for Scalable Asymmetric key and Fast Symmetric key Cryptosystems
K. Nekado
2013
Corpus ID: 17815809
This thesis proposes the Cyclic Vector Multiplication Algorithm (CVMA) for Gauss period Normal Basis (GNB). It is an e cient…
Expand
2013
2013
Introduction to the CHES 2012 special issue
E. Prouff
,
P. Schaumont
Journal of Cryptographic Engineering
2013
Corpus ID: 256116693
2012
2012
A group-based ring oscillator physical unclonable function
G. Qu
,
C. Yin
2012
Corpus ID: 106721767
Silicon Physical Unclonable Function (PUF) is a physical structure of the chip which has functional characteristics that are hard…
Expand
2009
2009
Improved cryptographic processor designs for security in rfid and other ubiquitous systems
C. Papachristou
,
Lawrence Leinweber
2009
Corpus ID: 53850582
In order to provide security in ubiquitous, passively powered systems, especially RFID tags in the supply chain, improved…
Expand
2008
2008
TPM context manager and dynamic configuration management for trusted virtualization platform
Yu Qin
,
D. Feng
,
Chunyong Liu
Wuhan University Journal of Natural Sciences
2008
Corpus ID: 26211220
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing…
Expand
2006
2006
Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System
Jeong Su Park
,
Su-Mi Lee
,
E. Choi
,
Dong Hoon Lee
Communication Systems and Applications
2006
Corpus ID: 39943184
RFID(Radio Frequency Identification) system will play a critical role providing widespread services in a ubiquitous environment…
Expand
2003
2003
Principal and Independent Component Analysis for Crypto-systems with Hardware Unmasked Units
Lilian Bohy
,
M. Neve
,
David Samyde
,
J. Quisquater
2003
Corpus ID: 17943162
Principal component analysis (PCA) is a well-known statis- tical method for reducing the dimension of a data set. This method…
Expand
2002
2002
Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
B. Kaliski
,
Ç. Koç
,
C. Paar
2002
Corpus ID: 53833040
2000
2000
Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Ç. Koç
,
C. Paar
2000
Corpus ID: 61511814
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE