Cantitate/Preț
Produs

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings: Lecture Notes in Computer Science, cartea 3156

Editat de Marc Joye, Jean-Jaques Quisquater
en Limba Engleză Paperback – 28 iul 2004

Din seria Lecture Notes in Computer Science

Preț: 40494 lei

Nou

Puncte Express: 607

Preț estimativ în valută:
7751 8078$ 6452£

Carte tipărită la comandă

Livrare economică 06-20 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540226666
ISBN-10: 3540226664
Pagini: 476
Ilustrații: XIV, 462 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 1.09 kg
Ediția:2004
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Side Channels I.- Towards Efficient Second-Order Power Analysis.- Correlation Power Analysis with a Leakage Model.- Power Analysis of an FPGA.- Modular Multiplication.- Long Modular Multiplication for Cryptographic Applications.- Leak Resistant Arithmetic.- Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography.- Low Resources I.- Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.- A Low-Cost ECC Coprocessor for Smartcards.- Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.- Implementation Aspects.- Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ).- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations.- Collision Attacks.- A Collision-Attack on AES.- Enhancing Collision Attacks.- Side Channels II.- Simple Power Analysis of Unified Code for ECC Double and Add.- DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve.- Switching Blindings with a View Towards IDEA.- Fault Attacks.- Fault Analysis of Stream Ciphers.- A Differential Fault Attack Against Early Rounds of (Triple-)DES.- Hardware Implementation I.- An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications.- Improving the Security of Dual-Rail Circuits.- Side Channels III.- A New Attack with Side Channel Leakage During Exponent Recoding Computations.- Defeating Countermeasures Based on Randomized BSD Representations.- Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems.- Efficient Countermeasures against RPA, DPA, and SPA.- Low Resources II.- Strong Authentication for RFID Systems Using the AES Algorithm.- TTS: High-Speed Signatures on a Low-Cost Smart Card.- Hardware Implementation II.- XTR Implementation on Reconfigurable Hardware.- Concurrent Error Detection Schemes for Involution Ciphers.- Authentication and Signatures.- Public Key Authentication with One (Online) Single Addition.- Attacking DSA Under a Repeated Bits Assumption.- How to Disembed a Program?.

Caracteristici

Includes supplementary material: sn.pub/extras