My Account Log in

1 option

Cryptographic Hardware and Embedded Systems - CHES 2004 : 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings / edited by Marc Joye, Jean-Jaques Quisquater.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Joye, Marc, 1969- editor.
Quisquater, Jean-Jaques, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 3156.
Lecture Notes in Computer Science, 0302-9743 ; 3156
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Computers, Special purpose.
Logic design.
Operating systems (Computers).
Management information systems.
Computer science.
Cryptology.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Logic Design.
Operating Systems.
Management of Computing and Information Systems.
Local Subjects:
Cryptology.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Logic Design.
Operating Systems.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XIV, 462 pages).
Edition:
First edition 2004.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
System Details:
text file PDF
Contents:
Side Channels I
Towards Efficient Second-Order Power Analysis
Correlation Power Analysis with a Leakage Model
Power Analysis of an FPGA
Modular Multiplication
Long Modular Multiplication for Cryptographic Applications
Leak Resistant Arithmetic
Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography
Low Resources I
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
A Low-Cost ECC Coprocessor for Smartcards
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Implementation Aspects
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m )
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
Collision Attacks
A Collision-Attack on AES
Enhancing Collision Attacks
Side Channels II
Simple Power Analysis of Unified Code for ECC Double and Add
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
Switching Blindings with a View Towards IDEA
Fault Attacks
Fault Analysis of Stream Ciphers
A Differential Fault Attack Against Early Rounds of (Triple-)DES
Hardware Implementation I
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications
Improving the Security of Dual-Rail Circuits
Side Channels III
A New Attack with Side Channel Leakage During Exponent Recoding Computations
Defeating Countermeasures Based on Randomized BSD Representations
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
Efficient Countermeasures against RPA, DPA, and SPA
Low Resources II
Strong Authentication for RFID Systems Using the AES Algorithm
TTS: High-Speed Signatures on a Low-Cost Smart Card
Hardware Implementation II
XTR Implementation on Reconfigurable Hardware
Concurrent Error Detection Schemes for Involution Ciphers
Authentication and Signatures
Public Key Authentication with One (Online) Single Addition
Attacking DSA Under a Repeated Bits Assumption
How to Disembed a Program?.
Other Format:
Printed edition:
ISBN:
978-3-540-28632-5
9783540286325
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account