|
|
|
|
LEADER |
03777nmm a2200433 u 4500 |
001 |
EB000652430 |
003 |
EBX01000000000000001348915 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
140122 ||| eng |
020 |
|
|
|a 9783540286325
|
100 |
1 |
|
|a Joye, Marc
|e [editor]
|
245 |
0 |
0 |
|a Cryptographic Hardware and Embedded Systems - CHES 2004
|h Elektronische Ressource
|b 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings
|c edited by Marc Joye, Jean-Jaques Quisquater
|
250 |
|
|
|a 1st ed. 2004
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2004, 2004
|
300 |
|
|
|a XIV, 462 p
|b online resource
|
505 |
0 |
|
|a DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction -- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve -- Switching Blindings with a View Towards IDEA -- Fault Attacks -- Fault Analysis of Stream Ciphers -- A Differential Fault Attack Against Early Rounds of (Triple-)DES -- Hardware Implementation I -- An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications -- Improving the Security of Dual-Rail Circuits -- Side Channels III -- A New Attack with Side Channel Leakage During Exponent Recoding Computations -- Defeating Countermeasures Based on Randomized BSD Representations -- Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems -- Efficient Countermeasures against RPA, DPA, and SPA -- Low Resources II -- Strong Authentication for RFID Systems Using the AES Algorithm --
|
505 |
0 |
|
|a TTS: High-Speed Signatures on a Low-Cost Smart Card -- Hardware Implementation II -- XTR Implementation on Reconfigurable Hardware -- Concurrent Error Detection Schemes for Involution Ciphers -- Authentication and Signatures -- Public Key Authentication with One (Online) Single Addition -- Attacking DSA Under a Repeated Bits Assumption -- How to Disembed a Program?
|
505 |
0 |
|
|a Side Channels I -- Towards Efficient Second-Order Power Analysis -- Correlation Power Analysis with a Leakage Model -- Power Analysis of an FPGA -- Modular Multiplication -- Long Modular Multiplication for Cryptographic Applications -- Leak Resistant Arithmetic -- Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography -- Low Resources I -- Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic -- A Low-Cost ECC Coprocessor for Smartcards -- Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs -- Implementation Aspects -- Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ) -- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations -- Collision Attacks -- A Collision-Attack on AES -- Enhancing Collision Attacks -- Side Channels II -- Simple Power Analysis of Unified Code for ECC Double and Add --
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Operating Systems
|
653 |
|
|
|a Operating systems (Computers)
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Logic design
|
653 |
|
|
|a Logic Design
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Special Purpose and Application-Based Systems
|
653 |
|
|
|a Computers, Special purpose
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Quisquater, Jean-Jaques
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b SBA
|a Springer Book Archives -2004
|
490 |
0 |
|
|a Lecture Notes in Computer Science
|
028 |
5 |
0 |
|a 10.1007/b99451
|
856 |
4 |
0 |
|u https://doi.org/10.1007/b99451?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|