|
|
|
|
LEADER |
00000nam a2200000 a 4500 |
001 |
4815234 |
003 |
ICU |
005 |
20040128132400.0 |
008 |
030103s2003 nyu b 101 0 eng |
010 |
|
|
|a 2003041534
|
020 |
|
|
|a 3540004092 (softcover : alk. paper)
|
040 |
|
|
|a DLC
|c DLC
|d OCoLC
|d OrLoB-B
|
042 |
|
|
|a pcc
|
049 |
|
|
|a CGUA
|
050 |
0 |
0 |
|a TK7895.E42
|b C45426 2002
|
082 |
0 |
0 |
|a 005.8
|2 21
|
111 |
2 |
|
|a CHES (Workshop
|n (4th :
|d 2002 :
|c Redwood Shores, Calif.)
|1 http://viaf.org/viaf/267170647
|
245 |
1 |
0 |
|a Cryptographic hardware and embedded systems--CHES 2002 :
|b 4th international workshop, Redwood Shores, CA, USA, August 2002 : revised papers /
|c Burton S. Kaliski, Jr., Çetin K. Koç, Christof Paar (eds.).
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer-Verlag,
|c c2003.
|
300 |
|
|
|a xiv, 612 p. :
|b ill. ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
440 |
|
0 |
|a Lecture notes in computer science ;
|v 2523
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t CHES: Past, Present, and Future /
|r Jean-Jacques Quisquater --
|t Optical Fault Induction Attacks /
|r Sergei P. Skorobogatov and Ross J. Anderson --
|t Template Attacks /
|r Suresh Chari, Josyula R. Rao and Pankaj Rohatgi --
|t The EM Side-Channel(s) /
|r Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao and Pankaj Rohatgi --
|t Enhanced Montgomery Multiplication /
|r Shay Gueron --
|t New Algorithm for Classical Modular Inverse /
|r Robert Lorencz --
|t Increasing the Bitlength of a Crypto-Coprocessor /
|r Wieland Fischer and Jean-Pierre Seifert --
|t Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems /
|r Elisabeth Oswald --
|t Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks /
|r Elena Trichina and Antonio Bellezza --
|t Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor /
|r Catherine H. Gebotys and Robert J. Gebotys --
|t Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA /
|r Kouichi Itoh, Totsuya Izu and Masahiko Takenaka --
|t 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis /
|r A. K. Lutz, J. Treichler, F. K. Gurkaynak, H. Kaeslin, G. Basler, A. Erni, S. Reichmuth, P. Rommens, S. Oetiker and W. Fichtner --
|t Efficient Software Implementation of AES on 32-Bit Platforms /
|r Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti and Stefano Marchesin --
|t An Optimized S-Box Circuit Architecture for Low Power AES Design /
|r Sumio Morioka and Akashi Satoh --
|t Simplified Adaptive Multiplicative Masking for AES /
|r Elena Trichina, Domenico De Seta and Lucia Germani --
|t Multiplicative Masking and Power Analysis of AES /
|r Jovan D. Golic and Christophe Tymen --
|t Keeping Secrets in Hardware: The Microsoft Xbox Case Study /
|r Andrew Huang --
|t A DPA Attack against the Modular Reduction within a CRT Implementation of RSA /
|r Bert den Boer, Kerstin Lemke and Guntram Wicke --
|t Further Results and Considerations on Side Channel Attacks on RSA /
|r Vlastimil Klima and Tomas Rosa --
|t Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures /
|r Christian Aumuller, Peter Bier, Wieland Fischer, Peter Hofreiter and Jean-Pierre Seifert --
|t Some Security Aspects of the MIST Randomized Exponentiation Algorithm /
|r Colin D. Walter --
|t The Montgomery Powering Ladder /
|r Marc Joye and Sung-Ming Yen --
|t DPA Countermeasures by Improving the Window Method /
|r Kouichi Itoh, Jun Yajima, Masahiko Takenaka and Naoya Torii --
|t Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions /
|r Martijn Stam and Arjen K. Lenstra --
|t On the Efficient Generation of Elliptic Curves over Prime Fields /
|r Elisavet Konstantinou, Yiannis C. Stamatiou and Christos Zaroliagis --
|t An End-to-End Systems Approach to Elliptic Curve Cryptography /
|r Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel Finchelstein, Edouard Goupy and Douglas Stebila --
|t A Low-Power Design for an Elliptic Curve Digital Signature Chip /
|r Richard Schroeppel, Cheryl Beaver, Rita Conzales, Russell Miller and Timothy Draelos --
|t A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2[superscript n]) /
|r M. Ernst, M. Jung, F. Madlener, S. Huss and R. Blumel --
|t Genus Two Hyperelliptic Curve Coprocessor /
|r N. Boston, T. Clancy, Y. Liow and J. Webster --
|t True Random Number Generator Embedded in Reconfigurable Hardware /
|r Viktor Fischer and Milos Drutarovsky --
|t Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications /
|r Werner Schindler and Wolfgang Killmann --
|t A Hardware Random Number Generator /
|r Thomas E. Tkacik --
|t RFID Systems and Security and Privacy Implications /
|r Sanjay E. Sarma, Stephen A. Weis and Daniel W. Engels --
|t A New Class of Invertible Mappings /
|r Alexander Klimov and Adi Shamir --
|t Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2[superscript n]) /
|r Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas and Cetin K. Koc --
|t Dual-Field Arithmetic Unit for GF(p) and GF(2[superscript m]) /
|r Johannes Wolkerstorfer --
|t Error Detection in Polynomial Basis Multipliers over Binary Extension Fields /
|r Arash Reyhani-Masoleh and M. A. Hasan --
|t Hardware Implementation of Finite Fields of Characteristic Three /
|r D. Page and N. P. Smart --
|t Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication /
|r Mathieu Ciet, Jean-Jacques Quisquater and Francesco Sica --
|t Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks /
|r Jae Cheol Ha and Sang Jae Moon --
|t Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick /
|r Katsuyuki Okeya and Kouichi Sakurai --
|t Experience Using a Low-Cost FPGA Design to Crack DES Keys /
|r Richard Clayton and Mike Bond --
|t A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results /
|r Francois-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater and Jean-Didier Legat.
|
530 |
|
|
|a Also available via the World Wide Web.
|
650 |
|
0 |
|a Embedded computer systems
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008102939
|
650 |
|
0 |
|a Cryptography
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101157
|
650 |
|
0 |
|a Computer security
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101458
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 http://id.worldcat.org/fast/fst00872484
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 http://id.worldcat.org/fast/fst00884552
|
650 |
|
7 |
|a Embedded computer systems.
|2 fast
|0 http://id.worldcat.org/fast/fst00908298
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 http://id.worldcat.org/fast/fst01423772
|
700 |
1 |
|
|a Kaliski, Burton S.,
|d 1964-
|0 http://id.loc.gov/authorities/names/n2003002869
|1 http://viaf.org/viaf/85360511
|
700 |
1 |
|
|a Koç, Çetin K.,
|d 1957-
|0 http://id.loc.gov/authorities/names/n99255254
|1 http://viaf.org/viaf/310701864
|
700 |
1 |
|
|a Paar, Christof,
|d 1963-
|0 http://id.loc.gov/authorities/names/n99254999
|1 http://viaf.org/viaf/47040844
|
856 |
4 |
1 |
|u http://link.springer-ny.com/link/service/series/0558/tocs/t2523.htm
|z Restricted to Springer LINK subscribers
|
035 |
|
|
|a (OCoLC)82410687
|
903 |
|
|
|a HeVa
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i f1243c6b-76c7-52dc-8b8f-88be79c5fbb8
|s 48815428-f9b0-5917-9012-decdc0afa1ff
|
928 |
|
|
|t Library of Congress classification
|a TK7895.E42C45426 2002
|l Online
|c UC-FullText
|n Restricted to Springer LINK subscribers
|u http://link.springer-ny.com/link/service/series/0558/tocs/t2523.htm
|g ebooks
|i 7687789
|
928 |
|
|
|t Library of Congress classification
|a TK7895.E42C45426 2002
|l ASR
|c ASR-SciASR
|i 4398208
|
927 |
|
|
|t Library of Congress classification
|a TK7895.E42C45426 2002
|l ASR
|c ASR-SciASR
|e CRERAR
|b 63327922
|i 7404404
|