Articles liés à Cryptographic Hardware and Embedded Systems - CHES...

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings - Couverture souple

 
9783662197318: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings

L'édition de cet ISBN n'est malheureusement plus disponible.

Synopsis

Side Channels I.- Towards Efficient Second-Order Power Analysis.- Correlation Power Analysis with a Leakage Model.- Power Analysis of an FPGA.- Modular Multiplication.- Long Modular Multiplication for Cryptographic Applications.- Leak Resistant Arithmetic.- Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography.- Low Resources I.- Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.- A Low-Cost ECC Coprocessor for Smartcards.- Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.- Implementation Aspects.- Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ).- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations.- Collision Attacks.- A Collision-Attack on AES.- Enhancing Collision Attacks.- Side Channels II.- Simple Power Analysis of Unified Code for ECC Double and Add.- DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve.- Switching Blindings with a View Towards IDEA.- Fault Attacks.- Fault Analysis of Stream Ciphers.- A Differential Fault Attack Against Early Rounds of (Triple-)DES.- Hardware Implementation I.- An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications.- Improving the Security of Dual-Rail Circuits.- Side Channels III.- A New Attack with Side Channel Leakage During Exponent Recoding Computations.- Defeating Countermeasures Based on Randomized BSD Representations.- Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems.- Efficient Countermeasures against RPA, DPA, and SPA.- Low Resources II.- Strong Authentication for RFID Systems Using the AES Algorithm.- TTS: High-Speed Signatures on a Low-Cost Smart Card.- Hardware Implementation II.- XTR Implementation on Reconfigurable Hardware.- Concurrent Error Detection Schemes for Involution Ciphers.- Authentication and Signatures.- Public Key Authentication with One (Online) Single Addition.- Attacking DSA Under a Repeated Bits Assumption.- How to Disembed a Program?.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

(Aucun exemplaire disponible)

Chercher:



Créez une demande

Vous ne trouvez pas le livre que vous recherchez ? Nous allons poursuivre vos recherches. Si l'un de nos libraires l'ajoute aux offres sur AbeBooks, nous vous le ferons savoir !

Créez une demande

Autres éditions populaires du même titre

9783540226666: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings

Edition présentée

ISBN 10 :  3540226664 ISBN 13 :  9783540226666
Editeur : Springer, 2008
Couverture souple