HOME > 상세정보

상세정보

Cryptographic hardware and embedded systems : First International Workshop, CHES '99, Worcester, MA, USA, August 1999 : proceedings

Cryptographic hardware and embedded systems : First International Workshop, CHES '99, Worcester, MA, USA, August 1999 : proceedings

자료유형
단행본
개인저자
Koc, Cetin K., 1957-. Paar, Christof, 1963-.
서명 / 저자사항
Cryptographic hardware and embedded systems : First International Workshop, CHES '99, Worcester, MA, USA, August 1999 : proceedings / Cetin K. Koc, Christof Paar (eds.).
발행사항
Berlin ;   New York :   Springer,   c1999.  
형태사항
xi, 352 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1717
ISBN
354066646X (pbk. : alk. paper) 9783540666462 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Embedded computer systems. Cryptography -- Congresses. Computer security -- Congresses.
000 01453camuu2200361 a 4500
001 000001049565
005 20091125135353
008 991012s1999 gw a b 001 0 eng
010 ▼a 99051604
020 ▼a 354066646X (pbk. : alk. paper)
020 ▼a 9783540666462 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm42708156
035 ▼a (OCoLC)42708156
035 ▼a (KERIS)REF000005296715
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a TK7895.E42 ▼b C454 1999
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b C524c ▼c 1999
111 2 ▼a CHES '99 ▼d (1999 : ▼c Worcester, Mass.)
245 1 0 ▼a Cryptographic hardware and embedded systems : ▼b First International Workshop, CHES '99, Worcester, MA, USA, August 1999 : proceedings / ▼c Cetin K. Koc, Christof Paar (eds.).
246 3 0 ▼a CHES '99
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1999.
300 ▼a xi, 352 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1717
504 ▼a Includes bibliographical references and index.
650 0 ▼a Embedded computer systems.
650 0 ▼a Cryptography ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Koc, Cetin K., ▼d 1957-.
700 1 ▼a Paar, Christof, ▼d 1963-.
830 0 ▼a Lecture notes in computer science ; ▼v 1717.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 C524c 1999 등록번호 121186719 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실/ 청구기호 005.82 C524c 1999 등록번호 151081550 도서상태 대출가능 반납예정일 예약 서비스
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 C524c 1999 등록번호 121186719 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실/ 청구기호 005.82 C524c 1999 등록번호 151081550 도서상태 대출가능 반납예정일 예약 서비스

컨텐츠정보

목차

Invited Talk.- We Need Assurance.- Cryptanalytic Hardware.- Factoring Large Numbers with the TWINKLE Device.- DES Cracking on the Transmogrifier 2a.- Hardware Architectures.- Modelling the Crypto-Processor from Design to Synthesis.- A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond.- Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON.- Smartcards and Embedded Systems.- Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201.- How to Implement Cost-Effective and Secure Public Key Cryptosystems.- Invited Talk.- Montgomery's Multiplication Technique: How to Make It Smaller and Faster.- Arithmetic Algorithms I.- A Scalable Architecture for Montgomery Nultiplication.- Arithmetic Design for Permutation Groups.- Fast Multiplication in Finite Fields GF(2n).- Efficient Finite Field Basis Conversion Involving dual bases.- Power Attacks I.- Power Analysis Attacks of Modular Exponentiation in Smartcards.- DES and Differential Power Analysis The "Duplication" Method.- IPA: A New Class of Power Attacks.- Invited Talk.- Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems.- True Random Number Generators.- A Design of Reliable True Random Number Generator for Cryptographic Applications.- Random Number Generators Founded on Signal and Information Theory.- Cryptographic Algorithms on FPGAs.- A High-Performance Flexible Architecture for Cryptography.- CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor.- Elliptic Curve Scalar Multiplier Design Using FPGAs.- Arithmetic Algorithms II.- Highly Regular Architectures for Finite Field Computation Using Redundant Basis.- Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis.- Power Attacks II.- Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems.- Probing Attacks On Tamper-Resistant Devices.- Elliptic Curve Implementations.- Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation.- New Cryptographic Schemes and Modes of Operation.- NICE - New Ideal Coset Encryption -.- Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.


정보제공 : Aladin

관련분야 신착자료