HOME > 상세정보

상세정보

Cryptographic hardware and embedded systems--CHES 2000 : second international workshop, Worcester, MA, USA, August 17-18, 2000 : proceedings

Cryptographic hardware and embedded systems--CHES 2000 : second international workshop, Worcester, MA, USA, August 17-18, 2000 : proceedings

자료유형
단행본
개인저자
Koc, Cetin K., 1957-. Paar, Christof, 1963-.
서명 / 저자사항
Cryptographic hardware and embedded systems--CHES 2000 : second international workshop, Worcester, MA, USA, August 17-18, 2000 : proceedings / Cetin K. Koc, Christof Paar (eds.).
발행사항
New York :   Springer,   c2000.  
형태사항
xi, 354 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1965
ISBN
354041455X (pbk. : alk. paper) 9783540414551 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Embedded computer systems -- Congresses. Cryptography -- Congresses. Computer security -- Congresses.
000 01527camuu2200385 a 4500
001 000045561485
005 20091125134637
008 001205s2001 nyua b 101 0 eng
010 ▼a 00068731
020 ▼a 354041455X (pbk. : alk. paper)
020 ▼a 9783540414551 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm45506048
035 ▼a (OCoLC)45506048
035 ▼a (KERIS)REF000006180743
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a TK7895.E42 ▼b C45423 2000
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b C524c ▼c 2000
111 2 ▼a CHES 2000 ▼d (2000 : ▼c Worcester, Mass.)
245 1 0 ▼a Cryptographic hardware and embedded systems--CHES 2000 : ▼b second international workshop, Worcester, MA, USA, August 17-18, 2000 : proceedings / ▼c Cetin K. Koc, Christof Paar (eds.).
246 3 0 ▼a CHES 2000
260 ▼a New York : ▼b Springer, ▼c c2000.
300 ▼a xi, 354 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1965
504 ▼a Includes bibliographical references and index.
650 0 ▼a Embedded computer systems ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Koc, Cetin K., ▼d 1957-.
700 1 ▼a Paar, Christof, ▼d 1963-.
830 0 ▼a Lecture notes in computer science ; ▼v 1965.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 C524c 2000 등록번호 121186717 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Invited Talk.- Software Implementation of Elliptic Curve Cryptography over Binary Fields.- Implementation of Elliptic Curve Cryptosystems.- Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA.- A High-Performance Reconfigurable Elliptic Curve Processor for GF(2m).- Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor.- Power and Timing Analysis Attacks.- Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies.- Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards.- Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems.- A Timing Attack against RSA with the Chinese Remainder Theorem.- Hardware Implementation of Block Ciphers.- A Comparative Study of Performance of AES Final Candidates Using FPGAs.- A Dynamic FPGA Implementation of the Serpent Block Cipher.- A 12 Gbps DES Encryptor/Decryptor Core in an FPGA.- A 155 Mbps Triple-DES Network Encryptor.- Hardware Architectures.- An Energy Efficient Reconfigurable Public-Key Cryptography Processor Architecture.- High-Speed RSA Hardware Based on Barret's Modular Reduction Method.- Data Integrity in Hardware for Modular Arithmetic.- A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals.- Invited Talk.- How to Explain Side-Channel Leakage to Your Kids.- Power Analysis Attacks.- On Boolean and Arithmetic Masking against Differential Power Analysis.- Using Second-Order Power Analysis to Attack DPA Resistant Software.- Differential Power Analysis in the Presence of Hardware Countermeasures.- Arithmetic Architectures.- Montgomery Multiplier and Squarer in GF(2m).- A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m).- Montgomery Exponentiation with no Final Subtractions: Improved Results.- Physical Security and Cryptanalysis.- Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses.- Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis.- New Schemes and Algorithms.- MiniPASS: Authentication and Digital Signatures in a Constrained Environment.- Efficient Generation of Prime Numbers.


정보제공 : Aladin

관련분야 신착자료