HOME > Detail View

Detail View

Cryptographic hardware and embedded systems--CHES 2003 : 5th international workshop, Cologne, Germany, September 8-10, 2003 : proceedings

Cryptographic hardware and embedded systems--CHES 2003 : 5th international workshop, Cologne, Germany, September 8-10, 2003 : proceedings

Material type
단행본
Personal Author
Walter, Colin D., 1949-. Koc, Cetin K., 1957-. Paar, Christof, 1963-.
Title Statement
Cryptographic hardware and embedded systems--CHES 2003 : 5th international workshop, Cologne, Germany, September 8-10, 2003 : proceedings / Colin D. Walter, Cetin K. Koc, Christof Paar (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2003.  
Physical Medium
xiii, 440 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 2779
ISBN
3540408339 (pbk. : alk. paper) 9783540408338 (pbk. : alk. paper)
Subject Added Entry-Topical Term
Embedded computer systems -- Congresses. Cryptography -- Congresses. Computer security -- Congresses.
000 01564camuu2200397 a 4500
001 000045562081
005 20091127113335
008 030804s2003 gw a b 101 0 eng
010 ▼a 2003058585
020 ▼a 3540408339 (pbk. : alk. paper)
020 ▼a 9783540408338 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm52877945
035 ▼a (OCoLC)52877945
035 ▼a (KERIS)REF000009619122
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a TK7895.E42 ▼b C454 2003
082 0 0 ▼a 005.8 ▼2 22
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b C524c ▼c 2003
111 2 ▼a CHES 2003 ▼d (2003 : ▼c Cologne, Germany)
245 1 0 ▼a Cryptographic hardware and embedded systems--CHES 2003 : ▼b 5th international workshop, Cologne, Germany, September 8-10, 2003 : proceedings / ▼c Colin D. Walter, Cetin K. Koc, Christof Paar (eds.).
246 3 0 ▼a CHES 2003
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2003.
300 ▼a xiii, 440 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2779
650 0 ▼a Embedded computer systems ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Walter, Colin D., ▼d 1949-.
700 1 ▼a Koc, Cetin K., ▼d 1957-.
700 1 ▼a Paar, Christof, ▼d 1963-.
830 0 ▼a Lecture notes in computer science ; ▼v 2779.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 C524c 2003 Accession No. 121186789 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Invited Talk.- The Security Challenges of Ubiquitous Computing.- Side Channel Attack Methodology.- Multi-channel Attacks.- Hidden Markov Model Cryptanalysis.- Power-Analysis Attacks on an FPGA ? First Experimental Results.- Hardware Factorization.- Hardware to Solve Sparse Systems of Linear Equations over GF(2).- Symmetric Ciphers: Side Channel Attacks and Countermeasures.- Cryptanalysis of DES Implemented on Computers with Cache.- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad.- A New Algorithm for Switching from Arithmetic to Boolean Masking.- DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits.- Secure Hardware Logic.- Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers.- Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology.- Security Evaluation of Asynchronous Circuits.- Random Number Generators.- Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts.- True Random Number Generators Secure in a Changing Environment.- How to Predict the Output of a Hardware Random Number Generator.- Efficient Multiplication.- On Low Complexity Bit Parallel Polynomial Basis Multipliers.- Efficient Modular Reduction Algorithm in [x] and Its Application to “Left to Right” Modular Multiplication in [x].- Faster Double-Size Modular Multiplication from Euclidean Multipliers.- More on Efficient Arithmetic.- Efficient Exponentiation for a Class of Finite Fields GF(2 n ) Determined by Gauss Periods.- GCD-Free Algorithms for Computing Modular Inverses.- Attacks on Asymmetric Cryptosystems.- Attacking Unbalanced RSA-CRT Using SPA.- The Doubling Attack ? Why Upwards Is Better than Downwards.- An Analysis of Goubin’s Refined Power Analysis Attack.- A New Type of Timing Attack: Application to GPS.- Implementation of Symmetric Ciphers.- Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia.- Very Compact FPGA Implementation of the AES Algorithm.- Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.- Hyperelliptic Curve Cryptography.- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves.- Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems.- Countermeasures to Side Channel Leakage.- A Practical Countermeasure against Address-Bit Differential Power Analysis.- A More Flexible Countermeasure against Side Channel Attacks Using Window Method.- Security of Standards.- On the Security of PKCS #11.- Attacking RSA-Based Sessions in SSL/TLS.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Ramamurthy, Bina (2021)
윤관식 (2020)