Cryptographic Hardware and Embedded Systems - CHES 2004 : 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings /

Saved in:
Bibliographic Details
Author / Creator:Joye, Marc.
Imprint:Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Series:Lecture notes in computer science, 0302-9743 ; 3156
Subject:Computer Communication Networks
Computer science
Data encryption (Computer science)
Information systems
Logic design
Operating systems (Computers)
Software engineering
Format: E-Resource
URL for this record:
Hidden Bibliographic Details
Other authors / contributors:Quisquater, Jean-Jaques.
SpringerLink (Online service)
Table of Contents:
  • Side Channels I
  • Towards Efficient Second-Order Power Analysis
  • Correlation Power Analysis with a Leakage Model
  • Power Analysis of an FPGA (Implementation of Rijndael: Is Pipelining a DPA Countermeasure?)
  • Modular Multiplication
  • Long Modular Multiplication for Cryptographic Applications
  • Leak Resistant Arithmetic
  • Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography
  • Low Resources I
  • Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
  • A Low-Cost ECC Coprocessor for Smartcards
  • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
  • Implementation Aspects
  • Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m )
  • Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
  • Collision Attacks
  • A Collision-Attack on AES (Combining Side Channel- and Differential-Attack)
  • Enhancing Collision Attacks
  • Side Channels II
  • Simple Power Analysis of Unified Code for ECC Double and Add
  • DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
  • Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
  • Switching Blindings with a View Towards IDEA
  • Fault Attacks
  • Fault Analysis of Stream Ciphers
  • A Differential Fault Attack Against Early Rounds of (Triple-)DES
  • Hardware Implementation I
  • An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications
  • Improving the Security of Dual-Rail Circuits
  • Side Channels III
  • A New Attack with Side Channel Leakage During Exponent Recoding Computations
  • Defeating Countermeasures Based on Randomized BSD Representations
  • Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
  • Efficient Countermeasures Against RPA, DPA, and SPA
  • Low Resources II
  • Strong Authentication for RFID Systems
  • Using the AES Algorithm
  • TTS: High-Speed Signatures on a Low-Cost Smart Card
  • Hardware Implementation II
  • XTR Implementation on Reconfigurable Hardware
  • Concurrent Error Detection Schemes for Involution Ciphers
  • Authentication and Signatures
  • Public Key Authentication with One (Online) Single Addition
  • Attacking DSA Under a Repeated Bits Assumption
  • How to Disembed a Program?
  • Author Index