×
Loading...

Cryptographic hardware and embedded systems--CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedings by CHES 2004 (2004 : Cambridge, Mass.)

Book Information

TitleCryptographic hardware and embedded systems--CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedings
CreatorCHES 2004 (2004 : Cambridge, Mass.), Joye, Marc, 1969-, Quisquater, J.-J. (Jean-Jacques), 1945-
Year2004
PPI300
PublisherBerlin ; New York : Springer
LanguageEnglish
Mediatypetexts
SubjectEmbedded computer systems, Cryptography, Computer security, Systèmes enfouis (Informatique), Cryptographie, Sécurité informatique, Cryptographie (Informatique), Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems, Système imbriqué (Informatique), CHES, Cryptographic hardware, Embedded systems
ISBN3540226664, 9783540226666
Collectionfolkscanomy_miscellaneous, folkscanomy, additional_collections
Uploadersketch
Identifierspringer_10.1007-b99451
Telegram icon Share on Telegram
Download Now

Description

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. ProceedingsAuthor: Marc Joye, Jean-Jacques Quisquater Published by Springer Berlin Heidelberg ISBN: 978-3-540-22666-6 DOI: 10.1007/b99451Table of Contents:Towards Efficient Second-Order Power Analysis Correlation Power Analysis with a Leakage Model Power Analysis of an FPGA Long Modular Multiplication for Cryptographic Applications Leak Resistant Arithmetic Efficient Linear Array for Multiplication in GF(2 Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic A Low-Cost ECC Coprocessor for Smartcards Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations A Collision-Attack on AES Enhancing Collision Attacks Simple Power Analysis of Unified Code for ECC Double and Add DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve Switching Blindings with a View Towards IDEA Fault Analysis of Stream Ciphers A Differential Fault Attack Against Early Rounds of (Triple-)DES An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications, Includes bibliographical references and author index