HOME > Detail View

Detail View

Cryptographic hardware and embedded systems--CHES 2002 : 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002 : revised papers

Cryptographic hardware and embedded systems--CHES 2002 : 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002 : revised papers

Material type
단행본
Personal Author
Kaliski, Burton S., 1964-. Koc, Cetin K., 1957-. Paar, Christof, 1963-.
Title Statement
Cryptographic hardware and embedded systems--CHES 2002 : 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002 : revised papers / Burton S. Kaliski, Jr., Cetin K. Koc, Christof Paar (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2002.  
Physical Medium
xiv, 609 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 2523
ISBN
3540004092 (pbk. : alk. paper) 9783540004097 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Embedded computer systems -- Congresses. Cryptography -- Congresses. Computer security -- Congresses.
000 01653camuu2200409 a 4500
001 000045561480
005 20091127113355
008 030103s2002 nyua b 101 0 eng
010 ▼a 2003041534
020 ▼a 3540004092 (pbk. : alk. paper)
020 ▼a 9783540004097 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm51336581
035 ▼a (OCoLC)51336581
035 ▼a (KERIS)REF000006964305
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a TK7895.E42 ▼b C45426 2002
082 0 0 ▼a 005.8 ▼2 21
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b C524c ▼c 2002
111 2 ▼a CHES 2002 ▼d (2002 : ▼c Redwood Shores, Calif.)
245 1 0 ▼a Cryptographic hardware and embedded systems--CHES 2002 : ▼b 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002 : revised papers / ▼c Burton S. Kaliski, Jr., Cetin K. Koc, Christof Paar (eds.).
246 3 0 ▼a CHES 2002
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2002.
300 ▼a xiv, 609 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2523
504 ▼a Includes bibliographical references and index.
650 0 ▼a Embedded computer systems ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Kaliski, Burton S., ▼d 1964-.
700 1 ▼a Koc, Cetin K., ▼d 1957-.
700 1 ▼a Paar, Christof, ▼d 1963-.
830 0 ▼a Lecture notes in computer science ; ▼v 2523.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 C524c 2002 Accession No. 121186718 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Invited Talk.- CHES: Past, Present, and Future.- Attack Strategies.- Optical Fault Induction Attacks.- Template Attacks.- The EM Side-Channel(s).- Finite Field and Modular Arithmetic I.- Enhanced Montgomery Multiplication.- New Algorithm for Classical Modular Inverse.- Increasing the Bitlength of a Crypto-Coprocessor.- Elliptic Curve Cryptography I.- Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems.- Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks.- Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor.- Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.- AES and AES Candidates.- 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis.- Efficient Software Implementation of AES on 32-Bit Platforms.- An Optimized S-Box Circuit Architecture for Low Power AES Design.- Simplified Adaptive Multiplicative Masking for AES.- Multiplicative Masking and Power Analysis of AES.- Tamper Resistance.- Keeping Secrets in Hardware: The Microsoft XboxTM Case Study.- RSA Implementation.- A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.- Further Results and Considerations on Side Channel Attacks on RSA.- Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures.- Finite Field and Modular Arithmetic II.- Some Security Aspects of the MIST Randomized Exponentiation Algorithm.- The Montgomery Powering Ladder.- DPA Countermeasures by Improving the Window Method.- Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions.- Elliptic Curve Cryptography II.- On the Efficient Generation of Elliptic Curves over Prime Fields.- An End-to-End Systems Approach to Elliptic Curve Cryptography.- A Low-Power Design for an Elliptic Curve Digital Signature Chip.- A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over .- Genus Two Hyperelliptic Curve Coprocessor.- Random Number Generation.- True Random Number Generator Embedded in Reconfigurable Hardware.- Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications.- A Hardware Random Number Generator.- Invited Talk.- RFID Systems and Security and Privacy Implications.- New Primitives.- A New Class of Invertible Mappings.- Finite Field and Modular Arithmetic II.- Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2n).- Dual-Field Arithmetic Unit for GF(p) and GF(2m).- Error Detection in Polynomial Basis Multipliers over Binary Extension Fields.- Hardware Implementation of Finite Fields of Characteristic Three.- Elliptic Curve Cryptography III.- Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication.- Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks.- Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.- Hardware for Cryptanalysis.- Experience Using a Low-Cost FPGA Design to Crack DES Keys.- A Time-Memory Tradeo. Using Distinguished Points: New Analysis & FPGA Results.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Ramamurthy, Bina (2021)
윤관식 (2020)