New Added

Cryptographic hardware and embedded systems : First International Workshop, CHES ’99, Worcester, MA, USA, August 1999 : proceedings

Like Score+585

Cryptographic hardware and embedded systems : First International Workshop, CHES ’99, Worcester, MA, USA, August 1999 : proceedings
Original Title Cryptographic hardware and embedded systems : First International Workshop, CHES ’99, Worcester, MA, USA, August 1999 : proceedings
Author CHES ’99 (1999 : Worcester, Mass.), Koç, Çetin K., 1957-, Paar, Christof, 1963-
Publication date

Topics Embedded computer systems, Cryptography, Computer security, nombre aléatoire, courbe elliptique, algorithme arithmétique, architecture matériel, système embarqué, cryptographie, Systèmes enfouis (Informatique), Cryptographie, Sécurité informatique, Redes de computadores e tecnicas, Systèmes enfouis (informatique), Computer security, Cryptography, Embedded computer systems, Redes de computadores e tecnicas, Cryptographie, Systèmes enfouis (informatique)
Publisher Berlin , New York : Springer
Collection folkscanomy_miscellaneous, folkscanomy, additional_collections
Language English
Book Type EBook
Material Type Book
File Type PDF
Downloadable Yes
Support Mobile, Desktop, Tablet
Scan Quality: Best No watermark
PDF Quality: Good
Availability Yes
Price 0.00
Submitted By
Sketch the Cow
Submit Date
Cryptographic Hardware and Embedded Systems: First InternationalWorkshop, CHES’99 Worcester, MA, USA, August 12–13, 1999 Proceedings
Author: Çetin K. Koç, Christof Paar
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-66646-2
DOI: 10.1007/3-540-48059-5

Table of Contents:

  • We Need Assurance
  • Factoring Large Numbers with the TWINKLE Device
  • DES Cracking on the Transmogrifier 2a
  • Modelling the Crypto-Processor from Design to Synthesis
  • A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond
  • Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON
  • Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201
  • How to Implement Cost-Effective and Secure Public Key Cryptosystems
  • Montgomery’s Multiplication Technique: How to Make It Smaller and Faster
  • A Scalable Architecture for Montgomery Nultiplication
  • Arithmetic Design for Permutation Groups
  • Fast Multiplication in Finite Fields GF(2n)
  • Efficient Finite Field Basis Conversion Involving dual bases
  • Power Analysis Attacks of Modular Exponentiation in Smartcards
  • DES and Differential Power Analysis The “Duplication” Method
  • IPA: A New Class of Power Attacks
  • Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems
  • A Design of Reliable True Random Number Generator for Cryptographic Applications
  • Random Number Generators Founded on Signal and Information Theory
  • A High-Performance Flexible Architecture for Cryptography

Includes bibliographical references and index

We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account
Reset Password
Compare items
  • Total (0)
Compare
0