Cryptographic hardware and embedded systems : First International Workshop, CHES '99, Worcester, MA, USA, Augu
Author: CHES '99 (1999 : Worcester, Mass.), Koç, Çetin K., 1957-, Paar, Christof, 1963-
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Embedded computer systems, Cryptography, Computer security, nombre aléatoire, courbe elliptique, algorithme arithmétique, architecture matériel, système embarqué, cryptographie, Systèmes enfouis (Informatique), Cryptographie, Sécurité informatique, Redes de computadores e tecnicas, Systèmes enfouis (informatique), Computer security, Cryptography, Embedded computer systems, Redes de computadores e tecnicas, Cryptographie, Systèmes enfouis (informatique)
Publishers: Berlin ; New York : Springer
Collections: folkscanomy miscellaneous, folkscanomy, additional collections
ISBN Number: 354066646X, 9783540666462
Pages Count: 600
PPI Count: 600
PDF Count: 1
Total Size: 350.48 MB
PDF Size: 13.28 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Edition: Revised.
Downloads: 648
Views: 698
Total Files: 18
Media Type: texts
Total Files: 5
Last Modified: 2022-03-09 09:57:52
Size: 17.79 KB
Description
Author: Çetin K. Koç, Christof Paar
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-66646-2
DOI: 10.1007/3-540-48059-5
Table of Contents:
- We Need Assurance
- Factoring Large Numbers with the TWINKLE Device
- DES Cracking on the Transmogrifier 2a
- Modelling the Crypto-Processor from Design to Synthesis
- A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond
- Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON
- Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201
- How to Implement Cost-Effective and Secure Public Key Cryptosystems
- Montgomery’s Multiplication Technique: How to Make It Smaller and Faster
- A Scalable Architecture for Montgomery Nultiplication
- Arithmetic Design for Permutation Groups
- Fast Multiplication in Finite Fields GF(2n)
- Efficient Finite Field Basis Conversion Involving dual bases
- Power Analysis Attacks of Modular Exponentiation in Smartcards
- DES and Differential Power Analysis The “Duplication” Method
- IPA: A New Class of Power Attacks
- Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems
- A Design of Reliable True Random Number Generator for Cryptographic Applications
- Random Number Generators Founded on Signal and Information Theory
- A High-Performance Flexible Architecture for Cryptography
Includes bibliographical references and index