Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings: Lecture Notes in Computer Science, cartea 3156
Editat de Marc Joye, Jean-Jaques Quisquateren Limba Engleză Paperback – 28 iul 2004
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 340.32 lei
- 20% Preț: 341.95 lei
- 20% Preț: 453.32 lei
- 20% Preț: 238.01 lei
- 20% Preț: 340.32 lei
- 20% Preț: 438.69 lei
- Preț: 449.57 lei
- 20% Preț: 343.62 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 645.28 lei
- 17% Preț: 427.22 lei
- 20% Preț: 655.02 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 591.51 lei
- Preț: 381.21 lei
- 20% Preț: 337.00 lei
- 15% Preț: 438.59 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 575.48 lei
- 20% Preț: 583.40 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 353.50 lei
- 20% Preț: 585.88 lei
- Preț: 410.88 lei
- 20% Preț: 596.46 lei
- 20% Preț: 763.23 lei
- 20% Preț: 825.93 lei
- 20% Preț: 649.49 lei
- 20% Preț: 350.21 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 416.82 lei
Nou
Puncte Express: 625
Preț estimativ în valută:
79.79€ • 82.11$ • 67.26£
79.79€ • 82.11$ • 67.26£
Carte tipărită la comandă
Livrare economică 01-15 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540226666
ISBN-10: 3540226664
Pagini: 476
Ilustrații: XIV, 462 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 1.09 kg
Ediția:2004
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540226664
Pagini: 476
Ilustrații: XIV, 462 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 1.09 kg
Ediția:2004
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Side Channels I.- Towards Efficient Second-Order Power Analysis.- Correlation Power Analysis with a Leakage Model.- Power Analysis of an FPGA.- Modular Multiplication.- Long Modular Multiplication for Cryptographic Applications.- Leak Resistant Arithmetic.- Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography.- Low Resources I.- Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.- A Low-Cost ECC Coprocessor for Smartcards.- Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.- Implementation Aspects.- Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ).- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations.- Collision Attacks.- A Collision-Attack on AES.- Enhancing Collision Attacks.- Side Channels II.- Simple Power Analysis of Unified Code for ECC Double and Add.- DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve.- Switching Blindings with a View Towards IDEA.- Fault Attacks.- Fault Analysis of Stream Ciphers.- A Differential Fault Attack Against Early Rounds of (Triple-)DES.- Hardware Implementation I.- An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications.- Improving the Security of Dual-Rail Circuits.- Side Channels III.- A New Attack with Side Channel Leakage During Exponent Recoding Computations.- Defeating Countermeasures Based on Randomized BSD Representations.- Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems.- Efficient Countermeasures against RPA, DPA, and SPA.- Low Resources II.- Strong Authentication for RFID Systems Using the AES Algorithm.- TTS: High-Speed Signatures on a Low-Cost Smart Card.- Hardware Implementation II.- XTR Implementation on Reconfigurable Hardware.- Concurrent Error Detection Schemes for Involution Ciphers.- Authentication and Signatures.- Public Key Authentication with One (Online) Single Addition.- Attacking DSA Under a Repeated Bits Assumption.- How to Disembed a Program?.
Caracteristici
Includes supplementary material: sn.pub/extras