Coverart for item
The Resource Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings, Çetin K. Koç, David Naccache, Christof Paar (eds.)

Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings, Çetin K. Koç, David Naccache, Christof Paar (eds.)

Label
Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings
Title
Cryptographic hardware and embedded systems--CHES 2001
Title remainder
third international workshop, Paris, France, May 14-16, 2001 : proceedings
Statement of responsibility
Çetin K. Koç, David Naccache, Christof Paar (eds.)
Title variation
CHES 2001
Creator
Contributor
Subject
Genre
Language
eng
Member of
Additional physical form
Also available via the World Wide Web. Abstracts available without subscription.
Cataloging source
DLC
Dewey number
005.8/2
Illustrations
illustrations
Index
index present
LC call number
TK7895.E42
LC item number
C454 2001
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2001
http://bibfra.me/vocab/lite/meetingName
CHES (Workshop)
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
  • 1957-
  • 1967-
  • 1963-
http://library.link/vocab/relatedWorkOrContributorName
  • Koç, Çetin K.
  • Naccache, David
  • Paar, Christof
Series statement
Lecture notes in computer science,
Series volume
2162
http://library.link/vocab/subjectName
  • Embedded computer systems
  • Cryptography
  • Computer security
Label
Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings, Çetin K. Koç, David Naccache, Christof Paar (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Protecting Embedded Systems -- The Next Ten Years / R. Anderson -- A Sound Method for Switching between Boolean and Arithmetic Masking / L. Goubin -- Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware / E. Brier, H. Handschuh and C. Tymen -- Random Register Renaming to Foil DPA / D. May, H. L. Muller and N. P. Smart -- Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks / E. Oswald and M. Aigner -- Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm / H. Kuo and I. Verbauwhede -- High Performance Single-Chip FPGA Rijndael Algorithm / M. McLoone and J. V. McCanny -- Two Methods of Rijndael Implementation in Reconfigurable Hardware / V. Fisher and M. Drutarovsky -- Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor / N. Howgrave-Graham, J. Dyer and R. Gennaro -- Efficient Online Tests for True Random Number Generators / W. Schindler -- The Hessian Form of an Elliptic Curve / N. P. Smart -- Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve / K. Okeya and K. Sakurai -- Generating Elliptic Curves of Prime Order / E. Savas, T. A. Schmidt and C. K. Koc -- New Directions in Croptography / A. Shamir -- A New Low Complexity Parallel Multiplier for a Class of Finite fields / M. Leone -- Efficient Rijndael Encryption Implementation with Composite Field Arithmetic / A. Rudra, P. K. Dubey and C. S. Jutla / [et al.] -- High-Radix Design of a Scalable Modular Multiplier / A. F. Tenca, G. Todorov and C. K. Koc -- A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2[superscript m]) / J. Grossschadl -- Attacks on Cryptoprocessor Transaction Sets / M. Bond -- Bandwidth-Optimal Kleptographic Attacks / A. Young and M. Yung -- Electromagnetic Analysis: Concrete Results / K. Gandolfi, C. Mourtel and F. Olivier -- NTRU in Constrained Devices / D. V. Bailey, D. Coffin and A. Elbirt / [et al.] -- Transparent Harddisk Encryption / T. Pornin -- Sliding Windows Succumbs to Big Mac Attack / C. D. Walter -- Universal Exponentiation Algorithm: A First Step towards Provable SPA-Resistance / C. Clavier and M. Joye -- An Implementation of DES and AES, Secure against Some Attacks / M. Akkar and C. Giraud -- Efficient Implementation of "Large" Stream Cipher Systems / P. Sarkar and S. Maitra -- Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA / O. Y. H. Cheung, K. H. Tsoi and P. H. W. Leong / [et al.] -- A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware / G. Orlando and C. Paar -- Implementation of RSA Algorithm Based on RNS Montgomery Multiplication / H. Nozaki, M. Motoyama and A. Shimbo / [et al.] -- Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach / M. Joye and C. Tymen -- Preventing SPA/DPA in ECC Systems Using the Jacobi Form / P.-Y. Liardet and N. P. Smart -- Hessian Elliptic Curves and Side-Channel Attacks / M. Joye and J.-J. Quisquater
Control code
47831639
Dimensions
24 cm
Dimensions
unknown
Extent
xiv, 410 pages
Isbn
9783540425212
Isbn Type
(alk. paper)
Lccn
2001043445
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
Label
Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings, Çetin K. Koç, David Naccache, Christof Paar (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Protecting Embedded Systems -- The Next Ten Years / R. Anderson -- A Sound Method for Switching between Boolean and Arithmetic Masking / L. Goubin -- Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware / E. Brier, H. Handschuh and C. Tymen -- Random Register Renaming to Foil DPA / D. May, H. L. Muller and N. P. Smart -- Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks / E. Oswald and M. Aigner -- Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm / H. Kuo and I. Verbauwhede -- High Performance Single-Chip FPGA Rijndael Algorithm / M. McLoone and J. V. McCanny -- Two Methods of Rijndael Implementation in Reconfigurable Hardware / V. Fisher and M. Drutarovsky -- Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor / N. Howgrave-Graham, J. Dyer and R. Gennaro -- Efficient Online Tests for True Random Number Generators / W. Schindler -- The Hessian Form of an Elliptic Curve / N. P. Smart -- Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve / K. Okeya and K. Sakurai -- Generating Elliptic Curves of Prime Order / E. Savas, T. A. Schmidt and C. K. Koc -- New Directions in Croptography / A. Shamir -- A New Low Complexity Parallel Multiplier for a Class of Finite fields / M. Leone -- Efficient Rijndael Encryption Implementation with Composite Field Arithmetic / A. Rudra, P. K. Dubey and C. S. Jutla / [et al.] -- High-Radix Design of a Scalable Modular Multiplier / A. F. Tenca, G. Todorov and C. K. Koc -- A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2[superscript m]) / J. Grossschadl -- Attacks on Cryptoprocessor Transaction Sets / M. Bond -- Bandwidth-Optimal Kleptographic Attacks / A. Young and M. Yung -- Electromagnetic Analysis: Concrete Results / K. Gandolfi, C. Mourtel and F. Olivier -- NTRU in Constrained Devices / D. V. Bailey, D. Coffin and A. Elbirt / [et al.] -- Transparent Harddisk Encryption / T. Pornin -- Sliding Windows Succumbs to Big Mac Attack / C. D. Walter -- Universal Exponentiation Algorithm: A First Step towards Provable SPA-Resistance / C. Clavier and M. Joye -- An Implementation of DES and AES, Secure against Some Attacks / M. Akkar and C. Giraud -- Efficient Implementation of "Large" Stream Cipher Systems / P. Sarkar and S. Maitra -- Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA / O. Y. H. Cheung, K. H. Tsoi and P. H. W. Leong / [et al.] -- A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware / G. Orlando and C. Paar -- Implementation of RSA Algorithm Based on RNS Montgomery Multiplication / H. Nozaki, M. Motoyama and A. Shimbo / [et al.] -- Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach / M. Joye and C. Tymen -- Preventing SPA/DPA in ECC Systems Using the Jacobi Form / P.-Y. Liardet and N. P. Smart -- Hessian Elliptic Curves and Side-Channel Attacks / M. Joye and J.-J. Quisquater
Control code
47831639
Dimensions
24 cm
Dimensions
unknown
Extent
xiv, 410 pages
Isbn
9783540425212
Isbn Type
(alk. paper)
Lccn
2001043445
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote

Library Locations

    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
    • University of Missouri Libraries DepositoryBorrow it
      2908 Lemone Blvd, Columbia, MO, 65211, US
      38.919360 -92.291620
Processing Feedback ...