Cryptographic hardware and embedded systems CHES 2004 : 6th international workshop, Cambridge, MA, USA, Augus
Author: CHES 2004 (2004 : Cambridge, Mass.), Joye, Marc, 1969-, Quisquater, J.-J. (Jean-Jacques), 1945-
Added by: sketch
Added Date: 2015-12-29
Language: eng
Subjects: Embedded computer systems, Cryptography, Computer security, Systèmes enfouis (Informatique), Cryptographie, Sécurité informatique, Cryptographie (Informatique), Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems, Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems
Publishers: Berlin ; New York : Springer
Collections: folkscanomy miscellaneous, folkscanomy, additional collections
ISBN Number: 3540226664, 9783540226666
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 241.00 MB
PDF Size: 5.43 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 631
Views: 681
Total Files: 18
Media Type: texts
Total Files: 5
Last Modified: 2022-03-09 09:28:00
Size: 13.37 KB
Description
Author: Marc Joye, Jean-Jacques Quisquater
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22666-6
DOI: 10.1007/b99451
Table of Contents:
- Towards Efficient Second-Order Power Analysis
- Correlation Power Analysis with a Leakage Model
- Power Analysis of an FPGA
- Long Modular Multiplication for Cryptographic Applications
- Leak Resistant Arithmetic
- Efficient Linear Array for Multiplication in GF(2
- Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
- A Low-Cost ECC Coprocessor for Smartcards
- Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
- Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2
- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
- A Collision-Attack on AES
- Enhancing Collision Attacks
- Simple Power Analysis of Unified Code for ECC Double and Add
- DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
- Switching Blindings with a View Towards IDEA
- Fault Analysis of Stream Ciphers
- A Differential Fault Attack Against Early Rounds of (Triple-)DES
- An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications
Includes bibliographical references and author index