Cryptographic hardware and embedded systems--CHES 2002 : 4th international workshop, Redwood Shores, CA, USA, August 2002 : revised papers /

Saved in:
Bibliographic Details
Meeting name:CHES (Workshop (4th : 2002 : Redwood Shores, Calif.)
Imprint:Berlin ; New York : Springer-Verlag, c2003.
Description:xiv, 612 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science ; 2523
Subject:
Format: E-Resource Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/4815234
Hidden Bibliographic Details
Other authors / contributors:Kaliski, Burton S., 1964-
Koç, Çetin K., 1957-
Paar, Christof, 1963-
ISBN:3540004092 (softcover : alk. paper)
Notes:Includes bibliographical references and index.
Also available via the World Wide Web.

MARC

LEADER 00000nam a2200000 a 4500
001 4815234
003 ICU
005 20040128132400.0
008 030103s2003 nyu b 101 0 eng
010 |a  2003041534 
020 |a 3540004092 (softcover : alk. paper) 
040 |a DLC  |c DLC  |d OCoLC  |d OrLoB-B 
042 |a pcc 
049 |a CGUA 
050 0 0 |a TK7895.E42  |b C45426 2002 
082 0 0 |a 005.8  |2 21 
111 2 |a CHES (Workshop  |n (4th :  |d 2002 :  |c Redwood Shores, Calif.)  |1 http://viaf.org/viaf/267170647 
245 1 0 |a Cryptographic hardware and embedded systems--CHES 2002 :  |b 4th international workshop, Redwood Shores, CA, USA, August 2002 : revised papers /  |c Burton S. Kaliski, Jr., Çetin K. Koç, Christof Paar (eds.). 
260 |a Berlin ;  |a New York :  |b Springer-Verlag,  |c c2003. 
300 |a xiv, 612 p. :  |b ill. ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
440 0 |a Lecture notes in computer science ;  |v 2523 
504 |a Includes bibliographical references and index. 
505 0 0 |t CHES: Past, Present, and Future /  |r Jean-Jacques Quisquater --  |t Optical Fault Induction Attacks /  |r Sergei P. Skorobogatov and Ross J. Anderson --  |t Template Attacks /  |r Suresh Chari, Josyula R. Rao and Pankaj Rohatgi --  |t The EM Side-Channel(s) /  |r Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao and Pankaj Rohatgi --  |t Enhanced Montgomery Multiplication /  |r Shay Gueron --  |t New Algorithm for Classical Modular Inverse /  |r Robert Lorencz --  |t Increasing the Bitlength of a Crypto-Coprocessor /  |r Wieland Fischer and Jean-Pierre Seifert --  |t Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems /  |r Elisabeth Oswald --  |t Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks /  |r Elena Trichina and Antonio Bellezza --  |t Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor /  |r Catherine H. Gebotys and Robert J. Gebotys --  |t Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA /  |r Kouichi Itoh, Totsuya Izu and Masahiko Takenaka --  |t 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis /  |r A. K. Lutz, J. Treichler, F. K. Gurkaynak, H. Kaeslin, G. Basler, A. Erni, S. Reichmuth, P. Rommens, S. Oetiker and W. Fichtner --  |t Efficient Software Implementation of AES on 32-Bit Platforms /  |r Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti and Stefano Marchesin --  |t An Optimized S-Box Circuit Architecture for Low Power AES Design /  |r Sumio Morioka and Akashi Satoh --  |t Simplified Adaptive Multiplicative Masking for AES /  |r Elena Trichina, Domenico De Seta and Lucia Germani --  |t Multiplicative Masking and Power Analysis of AES /  |r Jovan D. Golic and Christophe Tymen --  |t Keeping Secrets in Hardware: The Microsoft Xbox Case Study /  |r Andrew Huang --  |t A DPA Attack against the Modular Reduction within a CRT Implementation of RSA /  |r Bert den Boer, Kerstin Lemke and Guntram Wicke --  |t Further Results and Considerations on Side Channel Attacks on RSA /  |r Vlastimil Klima and Tomas Rosa --  |t Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures /  |r Christian Aumuller, Peter Bier, Wieland Fischer, Peter Hofreiter and Jean-Pierre Seifert --  |t Some Security Aspects of the MIST Randomized Exponentiation Algorithm /  |r Colin D. Walter --  |t The Montgomery Powering Ladder /  |r Marc Joye and Sung-Ming Yen --  |t DPA Countermeasures by Improving the Window Method /  |r Kouichi Itoh, Jun Yajima, Masahiko Takenaka and Naoya Torii --  |t Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions /  |r Martijn Stam and Arjen K. Lenstra --  |t On the Efficient Generation of Elliptic Curves over Prime Fields /  |r Elisavet Konstantinou, Yiannis C. Stamatiou and Christos Zaroliagis --  |t An End-to-End Systems Approach to Elliptic Curve Cryptography /  |r Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel Finchelstein, Edouard Goupy and Douglas Stebila --  |t A Low-Power Design for an Elliptic Curve Digital Signature Chip /  |r Richard Schroeppel, Cheryl Beaver, Rita Conzales, Russell Miller and Timothy Draelos --  |t A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2[superscript n]) /  |r M. Ernst, M. Jung, F. Madlener, S. Huss and R. Blumel --  |t Genus Two Hyperelliptic Curve Coprocessor /  |r N. Boston, T. Clancy, Y. Liow and J. Webster --  |t True Random Number Generator Embedded in Reconfigurable Hardware /  |r Viktor Fischer and Milos Drutarovsky --  |t Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications /  |r Werner Schindler and Wolfgang Killmann --  |t A Hardware Random Number Generator /  |r Thomas E. Tkacik --  |t RFID Systems and Security and Privacy Implications /  |r Sanjay E. Sarma, Stephen A. Weis and Daniel W. Engels --  |t A New Class of Invertible Mappings /  |r Alexander Klimov and Adi Shamir --  |t Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2[superscript n]) /  |r Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas and Cetin K. Koc --  |t Dual-Field Arithmetic Unit for GF(p) and GF(2[superscript m]) /  |r Johannes Wolkerstorfer --  |t Error Detection in Polynomial Basis Multipliers over Binary Extension Fields /  |r Arash Reyhani-Masoleh and M. A. Hasan --  |t Hardware Implementation of Finite Fields of Characteristic Three /  |r D. Page and N. P. Smart --  |t Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication /  |r Mathieu Ciet, Jean-Jacques Quisquater and Francesco Sica --  |t Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks /  |r Jae Cheol Ha and Sang Jae Moon --  |t Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick /  |r Katsuyuki Okeya and Kouichi Sakurai --  |t Experience Using a Low-Cost FPGA Design to Crack DES Keys /  |r Richard Clayton and Mike Bond --  |t A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results /  |r Francois-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater and Jean-Didier Legat. 
530 |a Also available via the World Wide Web. 
650 0 |a Embedded computer systems  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102939 
650 0 |a Cryptography  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101157 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458 
650 7 |a Computer security.  |2 fast  |0 http://id.worldcat.org/fast/fst00872484 
650 7 |a Cryptography.  |2 fast  |0 http://id.worldcat.org/fast/fst00884552 
650 7 |a Embedded computer systems.  |2 fast  |0 http://id.worldcat.org/fast/fst00908298 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Kaliski, Burton S.,  |d 1964-  |0 http://id.loc.gov/authorities/names/n2003002869  |1 http://viaf.org/viaf/85360511 
700 1 |a Koç, Çetin K.,  |d 1957-  |0 http://id.loc.gov/authorities/names/n99255254  |1 http://viaf.org/viaf/310701864 
700 1 |a Paar, Christof,  |d 1963-  |0 http://id.loc.gov/authorities/names/n99254999  |1 http://viaf.org/viaf/47040844 
856 4 1 |u http://link.springer-ny.com/link/service/series/0558/tocs/t2523.htm  |z Restricted to Springer LINK subscribers 
035 |a (OCoLC)82410687 
903 |a HeVa 
929 |a cat 
999 f f |i f1243c6b-76c7-52dc-8b8f-88be79c5fbb8  |s 48815428-f9b0-5917-9012-decdc0afa1ff 
928 |t Library of Congress classification  |a TK7895.E42C45426 2002  |l Online  |c UC-FullText  |n Restricted to Springer LINK subscribers  |u http://link.springer-ny.com/link/service/series/0558/tocs/t2523.htm  |g ebooks  |i 7687789 
928 |t Library of Congress classification  |a TK7895.E42C45426 2002  |l ASR  |c ASR-SciASR  |i 4398208 
927 |t Library of Congress classification  |a TK7895.E42C45426 2002  |l ASR  |c ASR-SciASR  |e CRERAR  |b 63327922  |i 7404404