New Added

Cryptographic hardware and embedded systems–CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedings

Like Score+5711

Cryptographic hardware and embedded systems–CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedings
Original Title Cryptographic hardware and embedded systems–CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedings
Author CHES 2004 (2004 : Cambridge, Mass.), Joye, Marc, 1969-, Quisquater, J.-J. (Jean-Jacques), 1945-
Publication date

Topics Embedded computer systems, Cryptography, Computer security, Systèmes enfouis (Informatique), Cryptographie, Sécurité informatique, Cryptographie (Informatique), Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems, Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems
Publisher Berlin , New York : Springer
Collection folkscanomy_miscellaneous, folkscanomy, additional_collections
Language English
Book Type EBook
Material Type Book
File Type PDF
Downloadable Yes
Support Mobile, Desktop, Tablet
Scan Quality: Best No watermark
PDF Quality: Good
Availability Yes
Price 0.00
Submitted By
Sketch the Cow
Submit Date
Cryptographic Hardware and Embedded Systems – CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Author: Marc Joye, Jean-Jacques Quisquater
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22666-6
DOI: 10.1007/b99451

Table of Contents:

  • Towards Efficient Second-Order Power Analysis
  • Correlation Power Analysis with a Leakage Model
  • Power Analysis of an FPGA
  • Long Modular Multiplication for Cryptographic Applications
  • Leak Resistant Arithmetic
  • Efficient Linear Array for Multiplication in GF(2
  • Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
  • A Low-Cost ECC Coprocessor for Smartcards
  • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
  • Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2
  • Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
  • A Collision-Attack on AES
  • Enhancing Collision Attacks
  • Simple Power Analysis of Unified Code for ECC Double and Add
  • DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
  • Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
  • Switching Blindings with a View Towards IDEA
  • Fault Analysis of Stream Ciphers
  • A Differential Fault Attack Against Early Rounds of (Triple-)DES
  • An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications

Includes bibliographical references and author index

We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account
Reset Password
Compare items
  • Total (0)
Compare
0