Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings

Bibliographic Details
Other Authors: Joye, Marc (Editor), Quisquater, Jean-Jaques (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2004, 2004
Edition:1st ed. 2004
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03777nmm a2200433 u 4500
001 EB000652430
003 EBX01000000000000001348915
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783540286325 
100 1 |a Joye, Marc  |e [editor] 
245 0 0 |a Cryptographic Hardware and Embedded Systems - CHES 2004  |h Elektronische Ressource  |b 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings  |c edited by Marc Joye, Jean-Jaques Quisquater 
250 |a 1st ed. 2004 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2004, 2004 
300 |a XIV, 462 p  |b online resource 
505 0 |a DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction -- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve -- Switching Blindings with a View Towards IDEA -- Fault Attacks -- Fault Analysis of Stream Ciphers -- A Differential Fault Attack Against Early Rounds of (Triple-)DES -- Hardware Implementation I -- An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications -- Improving the Security of Dual-Rail Circuits -- Side Channels III -- A New Attack with Side Channel Leakage During Exponent Recoding Computations -- Defeating Countermeasures Based on Randomized BSD Representations -- Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems -- Efficient Countermeasures against RPA, DPA, and SPA -- Low Resources II -- Strong Authentication for RFID Systems Using the AES Algorithm --  
505 0 |a TTS: High-Speed Signatures on a Low-Cost Smart Card -- Hardware Implementation II -- XTR Implementation on Reconfigurable Hardware -- Concurrent Error Detection Schemes for Involution Ciphers -- Authentication and Signatures -- Public Key Authentication with One (Online) Single Addition -- Attacking DSA Under a Repeated Bits Assumption -- How to Disembed a Program? 
505 0 |a Side Channels I -- Towards Efficient Second-Order Power Analysis -- Correlation Power Analysis with a Leakage Model -- Power Analysis of an FPGA -- Modular Multiplication -- Long Modular Multiplication for Cryptographic Applications -- Leak Resistant Arithmetic -- Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography -- Low Resources I -- Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic -- A Low-Cost ECC Coprocessor for Smartcards -- Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs -- Implementation Aspects -- Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ) -- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations -- Collision Attacks -- A Collision-Attack on AES -- Enhancing Collision Attacks -- Side Channels II -- Simple Power Analysis of Unified Code for ECC Double and Add --  
653 |a Computer Communication Networks 
653 |a Operating Systems 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data encryption (Computer science) 
653 |a Logic design 
653 |a Logic Design 
653 |a Cryptology 
653 |a Special Purpose and Application-Based Systems 
653 |a Computers, Special purpose 
653 |a IT Operations 
700 1 |a Quisquater, Jean-Jaques  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/b99451 
856 4 0 |u https://doi.org/10.1007/b99451?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824