Document - eBookmela
Loading...

Cryptographic hardware and embedded systems CHES 2004 : 6th international workshop, Cambridge, MA, USA, Augus | CHES 2004 (2004 : Cambridge, Mass.), Joye, Marc, 1969-, Quisquater, J.-J. (Jean-Jacques), 1945-

Likes0
Telegram icon Share on Telegram

Cryptographic hardware and embedded systems CHES 2004 : 6th international workshop, Cambridge, MA, USA, Augus

User Rating: Be the first one!

Author: CHES 2004 (2004 : Cambridge, Mass.), Joye, Marc, 1969-, Quisquater, J.-J. (Jean-Jacques), 1945-

Added by: sketch

Added Date: 2015-12-29

Publication Date: 2004

Language: eng

Subjects: Embedded computer systems, Cryptography, Computer security, Systèmes enfouis (Informatique), Cryptographie, Sécurité informatique, Cryptographie (Informatique), Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems, Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems

Publishers: Berlin ; New York : Springer

Collections: folkscanomy miscellaneous, folkscanomy, additional collections

ISBN Number: 3540226664, 9783540226666

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 241.00 MB

PDF Size: 5.43 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 636

Views: 686

Total Files: 18

Media Type: texts

Description

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Author: Marc Joye, Jean-Jacques Quisquater
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22666-6
DOI: 10.1007/b99451

Table of Contents:

  • Towards Efficient Second-Order Power Analysis
  • Correlation Power Analysis with a Leakage Model
  • Power Analysis of an FPGA
  • Long Modular Multiplication for Cryptographic Applications
  • Leak Resistant Arithmetic
  • Efficient Linear Array for Multiplication in GF(2
  • Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
  • A Low-Cost ECC Coprocessor for Smartcards
  • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
  • Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2
  • Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
  • A Collision-Attack on AES
  • Enhancing Collision Attacks
  • Simple Power Analysis of Unified Code for ECC Double and Add
  • DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
  • Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
  • Switching Blindings with a View Towards IDEA
  • Fault Analysis of Stream Ciphers
  • A Differential Fault Attack Against Early Rounds of (Triple-)DES
  • An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications

Includes bibliographical references and author index
eBookmela
Logo
Register New Account